]> git.ipfire.org Git - thirdparty/nftables.git/commitdiff
tests: shell: fix failed tests due to missing quotes
authorEric Jallot <ejallot@gmail.com>
Tue, 8 Oct 2019 18:06:32 +0000 (20:06 +0200)
committerPhil Sutter <phil@nwl.cc>
Tue, 8 Oct 2019 18:38:01 +0000 (20:38 +0200)
Add double quotes to protect newlines when using <<< redirection.

See also commit b878cb7d83855.

Signed-off-by: Eric Jallot <ejallot@gmail.com>
Signed-off-by: Phil Sutter <phil@nwl.cc>
14 files changed:
tests/shell/testcases/flowtable/0001flowtable_0
tests/shell/testcases/listing/0015dynamic_0
tests/shell/testcases/listing/0017objects_0
tests/shell/testcases/listing/0018data_0
tests/shell/testcases/listing/0019set_0
tests/shell/testcases/maps/0007named_ifname_dtype_0
tests/shell/testcases/nft-f/0002rollback_rule_0
tests/shell/testcases/nft-f/0003rollback_jump_0
tests/shell/testcases/nft-f/0004rollback_set_0
tests/shell/testcases/nft-f/0005rollback_map_0
tests/shell/testcases/nft-f/0006action_object_0
tests/shell/testcases/nft-f/0017ct_timeout_obj_0
tests/shell/testcases/nft-f/0018ct_expectation_obj_0
tests/shell/testcases/sets/0029named_ifname_dtype_0

index 8336ec5a8f37f4dacc59b9ad8236db700dec45dc..2e18099452a0050e82f7d9ffcaffe20f9c1de2a1 100755 (executable)
@@ -12,4 +12,4 @@ EXPECTED='table inet t {
 }'
 
 set -e
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
index 5ddc4ad83a50af70fc6a0bbfb533dc82cfd62303..4ff74e321b8c44a088c7fbe6e897a2e59a1d1e8f 100755 (executable)
@@ -12,7 +12,7 @@ EXPECTED="table ip filter {
 
 set -e
 
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
 
 GET="$($NFT list set ip filter test_set)"
 if [ "$EXPECTED" != "$GET" ] ; then
index 14d614382e1be3d52f00d9e92a3fa711b684158b..8a586e8034f9cdfb72d619cc35d560c1020f560f 100755 (executable)
@@ -8,7 +8,7 @@ EXPECTED="table inet filter {
 
 set -e
 
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
 $NFT flush map inet filter countermap
 
 GET="$($NFT list map inet filter countermap)"
index 767fe13ae65a52c41d4182f19df147fef20662fb..544b6bf588e2325e21513ce18f29dcf818855800 100755 (executable)
@@ -8,7 +8,7 @@ EXPECTED="table inet filter {
 
 set -e
 
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
 $NFT flush map inet filter ipmap
 
 GET="$($NFT list map inet filter ipmap)"
index 04eb0faf74af1a91c782f0b58db847c062b218a7..54a8a06440793009aead065854ea30a3bf6845ee 100755 (executable)
@@ -8,7 +8,7 @@ EXPECTED="table inet filter {
 
 set -e
 
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
 $NFT flush set inet filter ipset
 
 GET="$($NFT list set inet filter ipset)"
index 4c7e7895a5ce340978acac1328cd1f6d02433900..b5c5116b5660abfbe41ce6774b0f27b701595ef2 100755 (executable)
@@ -15,5 +15,4 @@ EXPECTED="table inet t {
 }"
 
 set -e
-$NFT -f - <<< $EXPECTED
-
+$NFT -f - <<< "$EXPECTED"
index 33e1212d94fbd01a42e2e562924809acaa628839..8a9ca84a54e08d3902462d91c684145d59b915b1 100755 (executable)
@@ -27,13 +27,13 @@ table ip t2 {
        }
 }"
 
-$NFT -f - <<< $GOOD_RULESET
+$NFT -f - <<< "$GOOD_RULESET"
 if [ $? -ne 0 ] ; then
        echo "E: unable to load good ruleset" >&2
        exit 1
 fi
 
-$NFT -f - <<< $BAD_RULESET 2>/dev/null
+$NFT -f - <<< "$BAD_RULESET" 2>/dev/null
 if [ $? -eq 0 ]        ; then
        echo "E: bogus ruleset loaded?" >&2
        exit 1
index 294a234eef977ac01c025cf40fee13645b66417f..6fb6f4e854b11687172da1003bfd01277a5dcb06 100755 (executable)
@@ -27,13 +27,13 @@ table ip t2 {
        }
 }"
 
-$NFT -f - <<< $GOOD_RULESET
+$NFT -f - <<< "$GOOD_RULESET"
 if [ $? -ne 0 ] ; then
        echo "E: unable to load good ruleset" >&2
        exit 1
 fi
 
-$NFT -f - <<< $BAD_RULESET 2>/dev/null
+$NFT -f - <<< "$BAD_RULESET" 2>/dev/null
 if [ $? -eq 0 ]        ; then
        echo "E: bogus ruleset loaded?" >&2
        exit 1
index 512840efb97b253f01ff3752740fb7aa2a697ae0..bcc55df99061f7e97ddc624179c6c6fbaa4ec0d2 100755 (executable)
@@ -27,13 +27,13 @@ table ip t2 {
        }
 }"
 
-$NFT -f - <<< $GOOD_RULESET
+$NFT -f - <<< "$GOOD_RULESET"
 if [ $? -ne 0 ] ; then
        echo "E: unable to load good ruleset" >&2
        exit 1
 fi
 
-$NFT -f - <<< $BAD_RULESET 2>/dev/null
+$NFT -f - <<< "$BAD_RULESET" 2>/dev/null
 if [ $? -eq 0 ]        ; then
        echo "E: bogus ruleset loaded?" >&2
        exit 1
index b1eb3dd37471abb1098040cf5578fc4116e05fab..913595d7cd98ccd64c2d4d4ac2922eef2bcaa77e 100755 (executable)
@@ -30,13 +30,13 @@ table ip t2 {
        }
 }"
 
-$NFT -f - <<< $GOOD_RULESET
+$NFT -f - <<< "$GOOD_RULESET"
 if [ $? -ne 0 ] ; then
        echo "E: unable to load good ruleset" >&2
        exit 1
 fi
 
-$NFT -f - <<< $BAD_RULESET 2>/dev/null
+$NFT -f - <<< "$BAD_RULESET" 2>/dev/null
 if [ $? -eq 0 ]        ; then
        echo "E: bogus ruleset loaded?" >&2
        exit 1
index fab3070f493f0afc8b9e90edf5918c1e000ccc2b..ddee661dd65cc2315b1545a01963f33eabe1c860 100755 (executable)
@@ -40,7 +40,7 @@ RULESET=$(for family in $FAMILIES ; do
        generate1 $family
 done)
 
-$NFT -f - <<< $RULESET
+$NFT -f - <<< "$RULESET"
 if [ $? -ne 0 ] ; then
        echo "E: unable to load ruleset 1" >&2
        exit 1
index 1d6a0f7c84cfde1d702c45aa4bb0655c77c421a1..4f407793b23bac2af5d4943ac05d5188d6d5f39e 100755 (executable)
@@ -13,4 +13,4 @@ EXPECTED='table ip filter {
 }'
 
 set -e
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
index eb9df3ceb1211daa6af18639e12818d4f169e38c..4f9872f631304ee205dee6e50e23d667bce00666 100755 (executable)
@@ -15,4 +15,4 @@ EXPECTED='table ip filter {
 }'
 
 set -e
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"
index 724f16676c2e9f5cb80dd81014ddbdf4304798c6..39b3c90cf8dc5baf39fb845b39151769c0b2b92f 100755 (executable)
@@ -21,4 +21,4 @@ EXPECTED="table inet t {
 }"
 
 set -e
-$NFT -f - <<< $EXPECTED
+$NFT -f - <<< "$EXPECTED"