From: Florian Westphal Date: Tue, 7 Oct 2025 20:26:51 +0000 (+0200) Subject: tests: shell: type_route_chain: use in-tree nftables, not system-wide one X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=827bdfb26ee90f0e63f5a5edff6ca74081a9ffcc;p=thirdparty%2Fnftables.git tests: shell: type_route_chain: use in-tree nftables, not system-wide one Switch this to $NFT, which contains the locally-compiled binary. Signed-off-by: Florian Westphal --- diff --git a/tests/shell/testcases/packetpath/type_route_chain b/tests/shell/testcases/packetpath/type_route_chain index b4052fd9..6459451d 100755 --- a/tests/shell/testcases/packetpath/type_route_chain +++ b/tests/shell/testcases/packetpath/type_route_chain @@ -133,7 +133,7 @@ echo -e "\nTest ipv6 dscp reroute" ip -6 -n $C route add default via ${ip6_r2_br1} dev c_br1 table 100 ip -6 -n $C rule add dsfield 0x08 pref 1010 table 100 assert_pass "Add ipv6 dscp policy routing rule" -ip netns exec $C nft -f - <<-EOF +ip netns exec $C $NFT -f - <<-EOF table inet outgoing { chain output_route { type route hook output priority filter; policy accept; @@ -151,7 +151,7 @@ echo -e "\nTest ipv4 dscp reroute" ip -n $C route add default via ${ip4_r2_br1} dev c_br1 table 100 ip -n $C rule add dsfield 0x08 pref 1010 table 100 assert_pass "Add ipv4 dscp policy routing rule" -ip netns exec $C nft -f - <<-EOF +ip netns exec $C $NFT -f - <<-EOF table inet outgoing { chain output_route { type route hook output priority filter; policy accept; @@ -169,7 +169,7 @@ echo -e "\nTest ipv4 fwmark reroute" ip -n $C route add default via ${ip4_r2_br1} dev c_br1 table 100 ip -n $C rule add fwmark 0x0100 lookup 100 assert_pass "Add ipv4 fwmark policy routing rule" -ip netns exec $C nft -f - <<-EOF +ip netns exec $C $NFT -f - <<-EOF table inet outgoing { chain output_route { type route hook output priority filter; policy accept; @@ -187,7 +187,7 @@ echo -e "\nTest ipv6 fwmark reroute" ip -6 -n $C route add default via ${ip6_r2_br1} dev c_br1 table 100 ip -6 -n $C rule add fwmark 0x0100 lookup 100 assert_pass "Add ipv6 fwmark policy routing rule" -ip netns exec $C nft -f - <<-EOF +ip netns exec $C $NFT -f - <<-EOF table inet outgoing { chain output_route { type route hook output priority filter; policy accept;