return -1;
}
-# ifdef IFCONFIG_PATH
- cmd = virCommandNew(IFCONFIG_PATH);
+# ifdef IFCONFIG
+ cmd = virCommandNew(IFCONFIG);
virCommandAddArg(cmd, ifname);
if (VIR_SOCKET_ADDR_IS_FAMILY(addr, AF_INET6))
virCommandAddArg(cmd, "inet6");
virCommandAddArgList(cmd, "broadcast", bcaststr, NULL);
virCommandAddArg(cmd, "alias");
# else
- cmd = virCommandNew(IP_PATH);
+ cmd = virCommandNew(IP);
virCommandAddArgList(cmd, "addr", "add", NULL);
virCommandAddArgFormat(cmd, "%s/%u", addrstr, prefix);
if (peerstr)
if (!(addrstr = virSocketAddrFormat(addr)))
return -1;
-# ifdef IFCONFIG_PATH
- cmd = virCommandNew(IFCONFIG_PATH);
+# ifdef IFCONFIG
+ cmd = virCommandNew(IFCONFIG);
virCommandAddArg(cmd, ifname);
if (VIR_SOCKET_ADDR_IS_FAMILY(addr, AF_INET6))
virCommandAddArg(cmd, "inet6");
virCommandAddArgFormat(cmd, "%s/%u", addrstr, prefix);
virCommandAddArg(cmd, "-alias");
# else
- cmd = virCommandNew(IP_PATH);
+ cmd = virCommandNew(IP);
virCommandAddArgList(cmd, "addr", "del", NULL);
virCommandAddArgFormat(cmd, "%s/%u", addrstr, prefix);
virCommandAddArgList(cmd, "dev", ifname, NULL);
return -1;
if (!(gatewaystr = virSocketAddrFormat(gateway)))
return -1;
- cmd = virCommandNew(IP_PATH);
+ cmd = virCommandNew(IP);
virCommandAddArgList(cmd, "route", "add", NULL);
virCommandAddArgFormat(cmd, "%s/%u", addrstr, prefix);
virCommandAddArgList(cmd, "via", gatewaystr, "dev", ifname,
if (fwBuf) {
if (STREQ(type, "ipv4"))
- virBufferAddLit(fwBuf, IPTABLES_PATH);
+ virBufferAddLit(fwBuf, IPTABLES);
else if (STREQ(type, "ipv6"))
- virBufferAddLit(fwBuf, IP6TABLES_PATH);
+ virBufferAddLit(fwBuf, IP6TABLES);
else
- virBufferAddLit(fwBuf, EBTABLES_PATH);
+ virBufferAddLit(fwBuf, EBTABLES);
}
while (g_variant_iter_loop(iter, "s", &item)) {
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
virFirewallRule *fwrule;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n"
- IPTABLES_PATH " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A OUTPUT --jump DROP\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n"
+ IPTABLES " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A OUTPUT --jump DROP\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A OUTPUT --jump DROP\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A OUTPUT --jump DROP\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A OUTPUT --jump DROP\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -A OUTPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A OUTPUT --jump DROP\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.127 --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source 192.168.122.127 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
- IPTABLES_PATH " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.127 --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source 192.168.122.127 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source 192.168.122.255 --jump REJECT\n"
+ IPTABLES " -w -D INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();
int *status G_GNUC_UNUSED,
void *opaque G_GNUC_UNUSED)
{
- if (STREQ(args[0], IPTABLES_PATH) &&
+ if (STREQ(args[0], IPTABLES) &&
STREQ(args[1], "-w") &&
STREQ(args[2], "-L")) {
*output = g_strdup(TEST_FILTER_TABLE_LIST);
- } else if (STREQ(args[0], IPTABLES_PATH) &&
+ } else if (STREQ(args[0], IPTABLES) &&
STREQ(args[1], "-w") &&
STREQ(args[2], "-t") &&
STREQ(args[3], "nat") &&
int ret = -1;
const char *actual = NULL;
const char *expected =
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.127 --jump REJECT\n"
- IPTABLES_PATH " -w -L\n"
- IPTABLES_PATH " -w -t nat -L\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.130 --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.129' --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.129' --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source 192.168.122.128 --jump REJECT\n"
- IPTABLES_PATH " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
+ IPTABLES " -w -A INPUT --source 192.168.122.1 --jump ACCEPT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.127 --jump REJECT\n"
+ IPTABLES " -w -L\n"
+ IPTABLES " -w -t nat -L\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.130 --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.129' --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.129' --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source 192.168.122.128 --jump REJECT\n"
+ IPTABLES " -w -A INPUT --source '!192.168.122.1' --jump REJECT\n";
const struct testFirewallData *data = opaque;
g_autoptr(virCommandDryRunToken) dryRunToken = virCommandDryRunTokenNew();