#! /bin/sh
# Generated from testsuite.at by GNU Autoconf 2.69.
#
# Copyright (C) 2009-2012 Free Software Foundation, Inc.
#
# This test suite is free software; the Free Software Foundation gives
# unlimited permission to copy, distribute and modify it.
## -------------------- ##
## M4sh Initialization. ##
## -------------------- ##

# Be more Bourne compatible
DUALCASE=1; export DUALCASE # for MKS sh
if test -n "${ZSH_VERSION+set}" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on ${1+"$@"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '${1+"$@"}'='"$@"'
  setopt NO_GLOB_SUBST
else
  case `(set -o) 2>/dev/null` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi


as_nl='
'
export as_nl
# Printing a long string crashes Solaris 7 /usr/bin/printf.
as_echo='\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo$as_echo
# Prefer a ksh shell builtin over an external printf program on Solaris,
# but without wasting forks for bash or zsh.
if test -z "$BASH_VERSION$ZSH_VERSION" \
    && (test "X`print -r -- $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='print -r --'
  as_echo_n='print -rn --'
elif (test "X`printf %s $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='printf %s\n'
  as_echo_n='printf %s'
else
  if test "X`(/usr/ucb/echo -n -n $as_echo) 2>/dev/null`" = "X-n $as_echo"; then
    as_echo_body='eval /usr/ucb/echo -n "$1$as_nl"'
    as_echo_n='/usr/ucb/echo -n'
  else
    as_echo_body='eval expr "X$1" : "X\\(.*\\)"'
    as_echo_n_body='eval
      arg=$1;
      case $arg in #(
      *"$as_nl"*)
	expr "X$arg" : "X\\(.*\\)$as_nl";
	arg=`expr "X$arg" : ".*$as_nl\\(.*\\)"`;;
      esac;
      expr "X$arg" : "X\\(.*\\)" | tr -d "$as_nl"
    '
    export as_echo_n_body
    as_echo_n='sh -c $as_echo_n_body as_echo'
  fi
  export as_echo_body
  as_echo='sh -c $as_echo_body as_echo'
fi

# The user is always right.
if test "${PATH_SEPARATOR+set}" != set; then
  PATH_SEPARATOR=:
  (PATH='/bin;/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 && {
    (PATH='/bin:/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 ||
      PATH_SEPARATOR=';'
  }
fi


# IFS
# We need space, tab and new line, in precisely that order.  Quoting is
# there to prevent editors from complaining about space-tab.
# (If _AS_PATH_WALK were called with IFS unset, it would disable word
# splitting by setting IFS to empty value.)
IFS=" ""	$as_nl"

# Find who we are.  Look in the path if we contain no directory separator.
as_myself=
case $0 in #((
  *[\\/]* ) as_myself=$0 ;;
  *) as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -r "$as_dir/$0" && as_myself=$as_dir/$0 && break
  done
IFS=$as_save_IFS

     ;;
esac
# We did not find ourselves, most probably we were run as `sh COMMAND'
# in which case we are not to be found in the path.
if test "x$as_myself" = x; then
  as_myself=$0
fi
if test ! -f "$as_myself"; then
  $as_echo "$as_myself: error: cannot find myself; rerun with an absolute file name" >&2
  exit 1
fi

# Unset variables that we do not need and which cause bugs (e.g. in
# pre-3.0 UWIN ksh).  But do not cause bugs in bash 2.01; the "|| exit 1"
# suppresses any "Segmentation fault" message there.  '((' could
# trigger a bug in pdksh 5.2.14.
for as_var in BASH_ENV ENV MAIL MAILPATH
do eval test x\${$as_var+set} = xset \
  && ( (unset $as_var) || exit 1) >/dev/null 2>&1 && unset $as_var || :
done
PS1='$ '
PS2='> '
PS4='+ '

# NLS nuisances.
LC_ALL=C
export LC_ALL
LANGUAGE=C
export LANGUAGE

# CDPATH.
(unset CDPATH) >/dev/null 2>&1 && unset CDPATH

if test "x$CONFIG_SHELL" = x; then
  as_bourne_compatible="if test -n \"\${ZSH_VERSION+set}\" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on \${1+\"\$@\"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '\${1+\"\$@\"}'='\"\$@\"'
  setopt NO_GLOB_SUBST
else
  case \`(set -o) 2>/dev/null\` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi
"
  as_required="as_fn_return () { (exit \$1); }
as_fn_success () { as_fn_return 0; }
as_fn_failure () { as_fn_return 1; }
as_fn_ret_success () { return 0; }
as_fn_ret_failure () { return 1; }

exitcode=0
as_fn_success || { exitcode=1; echo as_fn_success failed.; }
as_fn_failure && { exitcode=1; echo as_fn_failure succeeded.; }
as_fn_ret_success || { exitcode=1; echo as_fn_ret_success failed.; }
as_fn_ret_failure && { exitcode=1; echo as_fn_ret_failure succeeded.; }
if ( set x; as_fn_ret_success y && test x = \"\$1\" ); then :

else
  exitcode=1; echo positional parameters were not saved.
fi
test x\$exitcode = x0 || exit 1
test -x / || exit 1"
  as_suggested="  as_lineno_1=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_1a=\$LINENO
  as_lineno_2=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_2a=\$LINENO
  eval 'test \"x\$as_lineno_1'\$as_run'\" != \"x\$as_lineno_2'\$as_run'\" &&
  test \"x\`expr \$as_lineno_1'\$as_run' + 1\`\" = \"x\$as_lineno_2'\$as_run'\"' || exit 1
test \$(( 1 + 1 )) = 2 || exit 1"
  if (eval "$as_required") 2>/dev/null; then :
  as_have_required=yes
else
  as_have_required=no
fi
  if test x$as_have_required = xyes && (eval "$as_suggested") 2>/dev/null; then :

else
  as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
as_found=false
for as_dir in /bin$PATH_SEPARATOR/usr/bin$PATH_SEPARATOR$PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
  as_found=:
  case $as_dir in #(
	 /*)
	   for as_base in sh bash ksh sh5; do
	     # Try only shells that exist, to save several forks.
	     as_shell=$as_dir/$as_base
	     if { test -f "$as_shell" || test -f "$as_shell.exe"; } &&
		    { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$as_shell"; } 2>/dev/null; then :
  CONFIG_SHELL=$as_shell as_have_required=yes
		   if { $as_echo "$as_bourne_compatible""$as_suggested" | as_run=a "$as_shell"; } 2>/dev/null; then :
  break 2
fi
fi
	   done;;
       esac
  as_found=false
done
$as_found || { if { test -f "$SHELL" || test -f "$SHELL.exe"; } &&
	      { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$SHELL"; } 2>/dev/null; then :
  CONFIG_SHELL=$SHELL as_have_required=yes
fi; }
IFS=$as_save_IFS


      if test "x$CONFIG_SHELL" != x; then :
  export CONFIG_SHELL
             # We cannot yet assume a decent shell, so we have to provide a
# neutralization value for shells without unset; and this also
# works around shells that cannot unset nonexistent variables.
# Preserve -v and -x to the replacement shell.
BASH_ENV=/dev/null
ENV=/dev/null
(unset BASH_ENV) >/dev/null 2>&1 && unset BASH_ENV ENV
case $- in # ((((
  *v*x* | *x*v* ) as_opts=-vx ;;
  *v* ) as_opts=-v ;;
  *x* ) as_opts=-x ;;
  * ) as_opts= ;;
esac
exec $CONFIG_SHELL $as_opts "$as_myself" ${1+"$@"}
# Admittedly, this is quite paranoid, since all the known shells bail
# out after a failed `exec'.
$as_echo "$0: could not re-execute with $CONFIG_SHELL" >&2
exit 255
fi

    if test x$as_have_required = xno; then :
  $as_echo "$0: This script requires a shell more modern than all"
  $as_echo "$0: the shells that I found on your system."
  if test x${ZSH_VERSION+set} = xset ; then
    $as_echo "$0: In particular, zsh $ZSH_VERSION has bugs and should"
    $as_echo "$0: be upgraded to zsh 4.3.4 or later."
  else
    $as_echo "$0: Please tell bug-autoconf@gnu.org about your system,
$0: including any error possibly output before this
$0: message. Then install a modern shell, or manually run
$0: the script under such a shell if you do have one."
  fi
  exit 1
fi
fi
fi
SHELL=${CONFIG_SHELL-/bin/sh}
export SHELL
# Unset more variables known to interfere with behavior of common tools.
CLICOLOR_FORCE= GREP_OPTIONS=
unset CLICOLOR_FORCE GREP_OPTIONS

## --------------------- ##
## M4sh Shell Functions. ##
## --------------------- ##
# as_fn_unset VAR
# ---------------
# Portably unset VAR.
as_fn_unset ()
{
  { eval $1=; unset $1;}
}
as_unset=as_fn_unset

# as_fn_set_status STATUS
# -----------------------
# Set $? to STATUS, without forking.
as_fn_set_status ()
{
  return $1
} # as_fn_set_status

# as_fn_exit STATUS
# -----------------
# Exit the shell with STATUS, even in a "trap 0" or "set -e" context.
as_fn_exit ()
{
  set +e
  as_fn_set_status $1
  exit $1
} # as_fn_exit

# as_fn_mkdir_p
# -------------
# Create "$as_dir" as a directory, including parents if necessary.
as_fn_mkdir_p ()
{

  case $as_dir in #(
  -*) as_dir=./$as_dir;;
  esac
  test -d "$as_dir" || eval $as_mkdir_p || {
    as_dirs=
    while :; do
      case $as_dir in #(
      *\'*) as_qdir=`$as_echo "$as_dir" | sed "s/'/'\\\\\\\\''/g"`;; #'(
      *) as_qdir=$as_dir;;
      esac
      as_dirs="'$as_qdir' $as_dirs"
      as_dir=`$as_dirname -- "$as_dir" ||
$as_expr X"$as_dir" : 'X\(.*[^/]\)//*[^/][^/]*/*$' \| \
	 X"$as_dir" : 'X\(//\)[^/]' \| \
	 X"$as_dir" : 'X\(//\)$' \| \
	 X"$as_dir" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X"$as_dir" |
    sed '/^X\(.*[^/]\)\/\/*[^/][^/]*\/*$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)[^/].*/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`
      test -d "$as_dir" && break
    done
    test -z "$as_dirs" || eval "mkdir $as_dirs"
  } || test -d "$as_dir" || as_fn_error $? "cannot create directory $as_dir"


} # as_fn_mkdir_p

# as_fn_executable_p FILE
# -----------------------
# Test if FILE is an executable regular file.
as_fn_executable_p ()
{
  test -f "$1" && test -x "$1"
} # as_fn_executable_p
# as_fn_append VAR VALUE
# ----------------------
# Append the text in VALUE to the end of the definition contained in VAR. Take
# advantage of any shell optimizations that allow amortized linear growth over
# repeated appends, instead of the typical quadratic growth present in naive
# implementations.
if (eval "as_var=1; as_var+=2; test x\$as_var = x12") 2>/dev/null; then :
  eval 'as_fn_append ()
  {
    eval $1+=\$2
  }'
else
  as_fn_append ()
  {
    eval $1=\$$1\$2
  }
fi # as_fn_append

# as_fn_arith ARG...
# ------------------
# Perform arithmetic evaluation on the ARGs, and store the result in the
# global $as_val. Take advantage of shells that can avoid forks. The arguments
# must be portable across $(()) and expr.
if (eval "test \$(( 1 + 1 )) = 2") 2>/dev/null; then :
  eval 'as_fn_arith ()
  {
    as_val=$(( $* ))
  }'
else
  as_fn_arith ()
  {
    as_val=`expr "$@" || test $? -eq 1`
  }
fi # as_fn_arith


# as_fn_error STATUS ERROR [LINENO LOG_FD]
# ----------------------------------------
# Output "`basename $0`: error: ERROR" to stderr. If LINENO and LOG_FD are
# provided, also output the error to LOG_FD, referencing LINENO. Then exit the
# script with STATUS, using 1 if that was 0.
as_fn_error ()
{
  as_status=$1; test $as_status -eq 0 && as_status=1
  if test "$4"; then
    as_lineno=${as_lineno-"$3"} as_lineno_stack=as_lineno_stack=$as_lineno_stack
    $as_echo "$as_me:${as_lineno-$LINENO}: error: $2" >&$4
  fi
  $as_echo "$as_me: error: $2" >&2
  as_fn_exit $as_status
} # as_fn_error

if expr a : '\(a\)' >/dev/null 2>&1 &&
   test "X`expr 00001 : '.*\(...\)'`" = X001; then
  as_expr=expr
else
  as_expr=false
fi

if (basename -- /) >/dev/null 2>&1 && test "X`basename -- / 2>&1`" = "X/"; then
  as_basename=basename
else
  as_basename=false
fi

as_me=`$as_basename -- "$0" ||
$as_expr X/"$0" : '.*/\([^/][^/]*\)/*$' \| \
	 X"$0" : 'X\(//\)$' \| \
	 X"$0" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X/"$0" |
    sed '/^.*\/\([^/][^/]*\)\/*$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`

if (as_dir=`dirname -- /` && test "X$as_dir" = X/) >/dev/null 2>&1; then
  as_dirname=dirname
else
  as_dirname=false
fi

# Avoid depending upon Character Ranges.
as_cr_letters='abcdefghijklmnopqrstuvwxyz'
as_cr_LETTERS='ABCDEFGHIJKLMNOPQRSTUVWXYZ'
as_cr_Letters=$as_cr_letters$as_cr_LETTERS
as_cr_digits='0123456789'
as_cr_alnum=$as_cr_Letters$as_cr_digits


  as_lineno_1=$LINENO as_lineno_1a=$LINENO
  as_lineno_2=$LINENO as_lineno_2a=$LINENO
  eval 'test "x$as_lineno_1'$as_run'" != "x$as_lineno_2'$as_run'" &&
  test "x`expr $as_lineno_1'$as_run' + 1`" = "x$as_lineno_2'$as_run'"' || {
  # Blame Lee E. McMahon (1931-1989) for sed's syntax.  :-)
  sed -n '
    p
    /[$]LINENO/=
  ' <$as_myself |
    sed '
      s/[$]LINENO.*/&-/
      t lineno
      b
      :lineno
      N
      :loop
      s/[$]LINENO\([^'$as_cr_alnum'_].*\n\)\(.*\)/\2\1\2/
      t loop
      s/-\n.*//
    ' >$as_me.lineno &&
  chmod +x "$as_me.lineno" ||
    { $as_echo "$as_me: error: cannot create $as_me.lineno; rerun with a POSIX shell" >&2; as_fn_exit 1; }

  # If we had to re-execute with $CONFIG_SHELL, we're ensured to have
  # already done that, so ensure we don't try to do so again and fall
  # in an infinite loop.  This has already happened in practice.
  _as_can_reexec=no; export _as_can_reexec
  # Don't try to exec as it changes $[0], causing all sort of problems
  # (the dirname of $[0] is not the place where we might find the
  # original and so on.  Autoconf is especially sensitive to this).
  . "./$as_me.lineno"
  # Exit status is that of the last command.
  exit
}

ECHO_C= ECHO_N= ECHO_T=
case `echo -n x` in #(((((
-n*)
  case `echo 'xy\c'` in
  *c*) ECHO_T='	';;	# ECHO_T is single tab character.
  xy)  ECHO_C='\c';;
  *)   echo `echo ksh88 bug on AIX 6.1` > /dev/null
       ECHO_T='	';;
  esac;;
*)
  ECHO_N='-n';;
esac

rm -f conf$$ conf$$.exe conf$$.file
if test -d conf$$.dir; then
  rm -f conf$$.dir/conf$$.file
else
  rm -f conf$$.dir
  mkdir conf$$.dir 2>/dev/null
fi
if (echo >conf$$.file) 2>/dev/null; then
  if ln -s conf$$.file conf$$ 2>/dev/null; then
    as_ln_s='ln -s'
    # ... but there are two gotchas:
    # 1) On MSYS, both `ln -s file dir' and `ln file dir' fail.
    # 2) DJGPP < 2.04 has no symlinks; `ln -s' creates a wrapper executable.
    # In both cases, we have to default to `cp -pR'.
    ln -s conf$$.file conf$$.dir 2>/dev/null && test ! -f conf$$.exe ||
      as_ln_s='cp -pR'
  elif ln conf$$.file conf$$ 2>/dev/null; then
    as_ln_s=ln
  else
    as_ln_s='cp -pR'
  fi
else
  as_ln_s='cp -pR'
fi
rm -f conf$$ conf$$.exe conf$$.dir/conf$$.file conf$$.file
rmdir conf$$.dir 2>/dev/null

if mkdir -p . 2>/dev/null; then
  as_mkdir_p='mkdir -p "$as_dir"'
else
  test -d ./-p && rmdir ./-p
  as_mkdir_p=false
fi

as_test_x='test -x'
as_executable_p=as_fn_executable_p

# Sed expression to map a string onto a valid CPP name.
as_tr_cpp="eval sed 'y%*$as_cr_letters%P$as_cr_LETTERS%;s%[^_$as_cr_alnum]%_%g'"

# Sed expression to map a string onto a valid variable name.
as_tr_sh="eval sed 'y%*+%pp%;s%[^_$as_cr_alnum]%_%g'"





SHELL=${CONFIG_SHELL-/bin/sh}

# How were we run?
at_cli_args="$@"


# Not all shells have the 'times' builtin; the subshell is needed to make
# sure we discard the 'times: not found' message from the shell.
at_times_p=false
(times) >/dev/null 2>&1 && at_times_p=:

# CLI Arguments to pass to the debugging scripts.
at_debug_args=
# -e sets to true
at_errexit_p=false
# Shall we be verbose?  ':' means no, empty means yes.
at_verbose=:
at_quiet=
# Running several jobs in parallel, 0 means as many as test groups.
at_jobs=1
at_traceon=:
at_trace_echo=:
at_check_filter_trace=:

# Shall we keep the debug scripts?  Must be `:' when the suite is
# run by a debug script, so that the script doesn't remove itself.
at_debug_p=false
# Display help message?
at_help_p=false
# Display the version message?
at_version_p=false
# List test groups?
at_list_p=false
# --clean
at_clean=false
# Test groups to run
at_groups=
# Whether to rerun failed tests.
at_recheck=
# Whether a write failure occurred
at_write_fail=0

# The directory we run the suite in.  Default to . if no -C option.
at_dir=`pwd`
# An absolute reference to this testsuite script.
case $as_myself in
  [\\/]* | ?:[\\/]* ) at_myself=$as_myself ;;
  * ) at_myself=$at_dir/$as_myself ;;
esac
# Whether -C is in effect.
at_change_dir=false

# Whether to enable colored test results.
at_color=auto
# List of the tested programs.
at_tested=''
# As many question marks as there are digits in the last test group number.
# Used to normalize the test group numbers so that `ls' lists them in
# numerical order.
at_format='???'
# Description of all the test groups.
at_help_all="1;firewall-cmd.at:5;basic options;offline panic reload;
2;firewall-cmd.at:28;get/list options;offline zone service icmp;
3;firewall-cmd.at:44;default zone;offline zone;
4;firewall-cmd.at:56;user zone;offline zone;
5;firewall-cmd.at:71;zone interfaces;offline zone;
6;firewall-cmd.at:169;zone sources;offline zone;
7;firewall-cmd.at:221;services;offline service;
8;firewall-cmd.at:265;user services;offline service;
9;firewall-cmd.at:337;ports;offline port;
10;firewall-cmd.at:394;source ports;offline port;
11;firewall-cmd.at:431;protocols;offline protocol;
12;firewall-cmd.at:459;masquerade;offline masquerade nat;
13;firewall-cmd.at:492;forward ports;offline port forward_port;
14;firewall-cmd.at:609;ICMP block;offline icmp;
15;firewall-cmd.at:655;user ICMP types;offline icmp;
16;firewall-cmd.at:678;ipset;offline ipset;
17;firewall-cmd.at:731;user helpers;offline helper;
18;firewall-cmd.at:759;direct;offline direct;
19;firewall-cmd.at:832;direct nat;offline direct nat;
20;firewall-cmd.at:856;direct passthrough;offline direct passthrough;
21;firewall-cmd.at:895;direct ebtables;offline direct ebtables;
22;firewall-cmd.at:940;lockdown;offline lockdown;
23;firewall-cmd.at:1007;rich rules good;offline rich;
24;firewall-cmd.at:1036;rich rules audit;offline rich;
25;firewall-cmd.at:1044;rich rules priority;offline rich;
26;firewall-cmd.at:1659;rich rules bad;offline rich;
27;firewall-cmd.at:1695;config validation;offline check_config;
28;firewall-offline-cmd.at:17;lokkit migration;offline lokkit;
29;firewalld.conf.at:1;firewalld.conf;nftables dbus;
30;service.at:1;dbus api - services;nftables dbus service rhbz1721414 rhbz1737045;
31;firewall-cmd.at:5;basic options;nftables panic reload;
32;firewall-cmd.at:28;get/list options;nftables zone service icmp;
33;firewall-cmd.at:44;default zone;nftables zone;
34;firewall-cmd.at:56;user zone;nftables zone;
35;firewall-cmd.at:71;zone interfaces;nftables zone;
36;firewall-cmd.at:169;zone sources;nftables zone;
37;firewall-cmd.at:221;services;nftables service;
38;firewall-cmd.at:265;user services;nftables service;
39;firewall-cmd.at:337;ports;nftables port;
40;firewall-cmd.at:394;source ports;nftables port;
41;firewall-cmd.at:431;protocols;nftables protocol;
42;firewall-cmd.at:459;masquerade;nftables masquerade nat;
43;firewall-cmd.at:492;forward ports;nftables port forward_port;
44;firewall-cmd.at:609;ICMP block;nftables icmp;
45;firewall-cmd.at:655;user ICMP types;nftables icmp;
46;firewall-cmd.at:678;ipset;nftables ipset;
47;firewall-cmd.at:731;user helpers;nftables helper;
48;firewall-cmd.at:759;direct;nftables direct;
49;firewall-cmd.at:832;direct nat;nftables direct nat;
50;firewall-cmd.at:856;direct passthrough;nftables direct passthrough;
51;firewall-cmd.at:895;direct ebtables;nftables direct ebtables;
52;firewall-cmd.at:940;lockdown;nftables lockdown;
53;firewall-cmd.at:1007;rich rules good;nftables rich;
54;firewall-cmd.at:1036;rich rules audit;nftables rich;
55;firewall-cmd.at:1044;rich rules priority;nftables rich;
56;firewall-cmd.at:1659;rich rules bad;nftables rich;
57;firewall-cmd.at:1695;config validation;nftables check_config;
58;rhbz1514043.at:1;--set-log-denied does not zero config;nftables log_denied rhbz1514043;
59;rhbz1498923.at:1;invalid direct rule causes reload error;nftables direct reload rhbz1498923;
60;pr181.at:1;combined zones name length check;nftables zone gh181;
61;gh287.at:1;ICMP block inversion;nftables icmp gh287;
62;individual_calls.at:1;individual calls;nftables individual_calls;
63;rhbz1534571.at:3;rule deduplication;nftables rhbz1534571;
64;gh290.at:1;invalid syntax in xml files;nftables xml direct zone gh290;
65;icmp_block_in_forward_chain.at:1;ICMP block present FORWARD chain;nftables icmp;
66;pr323.at:1;GRE proto helper;nftables helper gh323;
67;rhbz1506742.at:1;ipset with timeout;nftables ipset rhbz1506742;
68;rhbz1594657.at:1;no log untracked passthrough queries;nftables direct passthrough rhbz1594657;
69;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;nftables log_denied rhbz1571957 icmp;
70;rhbz1404076.at:1;query single port added with range;nftables port rhbz1404076;
71;gh366.at:1;service destination multiple IP versions;nftables service gh366;
72;rhbz1601610.at:1;ipset duplicate entries;nftables ipset rhbz1601610;
73;gh303.at:1;unicode in XML;nftables xml unicode service gh303;
74;gh335.at:1;forward-port toaddr enables IP forwarding;nftables port forward_port gh335;
75;gh482.at:1;remove forward-port after reload;nftables gh482 rhbz1637675 rich forward_port;
76;gh478.at:1;rich rule marks every packet;nftables rich mark gh478;
77;gh453.at:1;nftables helper objects;nftables helper gh453;
78;gh258.at:1;zone dispatch layout;nftables zone gh258 gh441 rhbz1713823;
79;rhbz1715977.at:1;rich rule destination with service destination;nftables rich service rhbz1715977;
80;rhbz1723610.at:1;direct remove-rules per family;nftables direct rhbz1723610 gh385;
81;rhbz1734765.at:1;zone sources ordered by name;nftables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
82;gh509.at:1;missing firewalld.conf file;nftables gh509;
83;python.at:3;firewalld_test.py;nftables python;
84;python.at:8;firewalld_config.py;nftables python;
85;python.at:13;firewalld_rich.py;nftables python;
86;python.at:18;firewalld_direct.py;nftables python;
87;rfc3964_ipv4.at:1;RFC3964_IPv4;nftables rfc3964_ipv4;
88;service_include.at:1;service include;nftables service xml gh273 rhbz1720300;
89;helpers_custom.at:1;customer helpers;nftables helpers rhbz1733066;
90;firewall-cmd.at:5;basic options;iptables panic reload;
91;firewall-cmd.at:28;get/list options;iptables zone service icmp;
92;firewall-cmd.at:44;default zone;iptables zone;
93;firewall-cmd.at:56;user zone;iptables zone;
94;firewall-cmd.at:71;zone interfaces;iptables zone;
95;firewall-cmd.at:169;zone sources;iptables zone;
96;firewall-cmd.at:221;services;iptables service;
97;firewall-cmd.at:265;user services;iptables service;
98;firewall-cmd.at:337;ports;iptables port;
99;firewall-cmd.at:394;source ports;iptables port;
100;firewall-cmd.at:431;protocols;iptables protocol;
101;firewall-cmd.at:459;masquerade;iptables masquerade nat;
102;firewall-cmd.at:492;forward ports;iptables port forward_port;
103;firewall-cmd.at:609;ICMP block;iptables icmp;
104;firewall-cmd.at:655;user ICMP types;iptables icmp;
105;firewall-cmd.at:678;ipset;iptables ipset;
106;firewall-cmd.at:731;user helpers;iptables helper;
107;firewall-cmd.at:759;direct;iptables direct;
108;firewall-cmd.at:832;direct nat;iptables direct nat;
109;firewall-cmd.at:856;direct passthrough;iptables direct passthrough;
110;firewall-cmd.at:895;direct ebtables;iptables direct ebtables;
111;firewall-cmd.at:940;lockdown;iptables lockdown;
112;firewall-cmd.at:1007;rich rules good;iptables rich;
113;firewall-cmd.at:1036;rich rules audit;iptables rich;
114;firewall-cmd.at:1044;rich rules priority;iptables rich;
115;firewall-cmd.at:1659;rich rules bad;iptables rich;
116;firewall-cmd.at:1695;config validation;iptables check_config;
117;rhbz1514043.at:1;--set-log-denied does not zero config;iptables log_denied rhbz1514043;
118;rhbz1498923.at:1;invalid direct rule causes reload error;iptables direct reload rhbz1498923;
119;pr181.at:1;combined zones name length check;iptables zone gh181;
120;gh287.at:1;ICMP block inversion;iptables icmp gh287;
121;individual_calls.at:1;individual calls;iptables individual_calls;
122;rhbz1534571.at:3;rule deduplication;iptables rhbz1534571;
123;gh290.at:1;invalid syntax in xml files;iptables xml direct zone gh290;
124;icmp_block_in_forward_chain.at:1;ICMP block present FORWARD chain;iptables icmp;
125;pr323.at:1;GRE proto helper;iptables helper gh323;
126;rhbz1506742.at:1;ipset with timeout;iptables ipset rhbz1506742;
127;rhbz1594657.at:1;no log untracked passthrough queries;iptables direct passthrough rhbz1594657;
128;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;iptables log_denied rhbz1571957 icmp;
129;rhbz1404076.at:1;query single port added with range;iptables port rhbz1404076;
130;gh366.at:1;service destination multiple IP versions;iptables service gh366;
131;rhbz1601610.at:1;ipset duplicate entries;iptables ipset rhbz1601610;
132;gh303.at:1;unicode in XML;iptables xml unicode service gh303;
133;gh335.at:1;forward-port toaddr enables IP forwarding;iptables port forward_port gh335;
134;gh482.at:1;remove forward-port after reload;iptables gh482 rhbz1637675 rich forward_port;
135;gh478.at:1;rich rule marks every packet;iptables rich mark gh478;
136;gh258.at:1;zone dispatch layout;iptables zone gh258 gh441 rhbz1713823;
137;rhbz1715977.at:1;rich rule destination with service destination;iptables rich service rhbz1715977;
138;rhbz1723610.at:1;direct remove-rules per family;iptables direct rhbz1723610 gh385;
139;rhbz1734765.at:1;zone sources ordered by name;iptables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
140;gh509.at:1;missing firewalld.conf file;iptables gh509;
141;python.at:3;firewalld_test.py;iptables python;
142;python.at:8;firewalld_config.py;iptables python;
143;python.at:13;firewalld_rich.py;iptables python;
144;python.at:18;firewalld_direct.py;iptables python;
145;rfc3964_ipv4.at:1;RFC3964_IPv4;iptables rfc3964_ipv4;
146;service_include.at:1;service include;iptables service xml gh273 rhbz1720300;
147;helpers_custom.at:1;customer helpers;iptables helpers rhbz1733066;
"
# List of the all the test groups.
at_groups_all=`$as_echo "$at_help_all" | sed 's/;.*//'`

# at_fn_validate_ranges NAME...
# -----------------------------
# Validate and normalize the test group number contained in each variable
# NAME. Leading zeroes are treated as decimal.
at_fn_validate_ranges ()
{
  for at_grp
  do
    eval at_value=\$$at_grp
    if test $at_value -lt 1 || test $at_value -gt 147; then
      $as_echo "invalid test group: $at_value" >&2
      exit 1
    fi
    case $at_value in
      0*) # We want to treat leading 0 as decimal, like expr and test, but
	  # AS_VAR_ARITH treats it as octal if it uses $(( )).
	  # With XSI shells, ${at_value#${at_value%%[1-9]*}} avoids the
	  # expr fork, but it is not worth the effort to determine if the
	  # shell supports XSI when the user can just avoid leading 0.
	  eval $at_grp='`expr $at_value + 0`' ;;
    esac
  done
}

at_prev=
for at_option
do
  # If the previous option needs an argument, assign it.
  if test -n "$at_prev"; then
    at_option=$at_prev=$at_option
    at_prev=
  fi

  case $at_option in
  *=?*) at_optarg=`expr "X$at_option" : '[^=]*=\(.*\)'` ;;
  *)    at_optarg= ;;
  esac

  # Accept the important Cygnus configure options, so we can diagnose typos.

  case $at_option in
    --help | -h )
	at_help_p=:
	;;

    --list | -l )
	at_list_p=:
	;;

    --version | -V )
	at_version_p=:
	;;

    --clean | -c )
	at_clean=:
	;;

    --color )
	at_color=always
	;;
    --color=* )
	case $at_optarg in
	no | never | none) at_color=never ;;
	auto | tty | if-tty) at_color=auto ;;
	always | yes | force) at_color=always ;;
	*) at_optname=`echo " $at_option" | sed 's/^ //; s/=.*//'`
	   as_fn_error $? "unrecognized argument to $at_optname: $at_optarg" ;;
	esac
	;;

    --debug | -d )
	at_debug_p=:
	;;

    --errexit | -e )
	at_debug_p=:
	at_errexit_p=:
	;;

    --verbose | -v )
	at_verbose=; at_quiet=:
	;;

    --trace | -x )
	at_traceon='set -x'
	at_trace_echo=echo
	at_check_filter_trace=at_fn_filter_trace
	;;

    [0-9] | [0-9][0-9] | [0-9][0-9][0-9] | [0-9][0-9][0-9][0-9])
	at_fn_validate_ranges at_option
	as_fn_append at_groups "$at_option$as_nl"
	;;

    # Ranges
    [0-9]- | [0-9][0-9]- | [0-9][0-9][0-9]- | [0-9][0-9][0-9][0-9]-)
	at_range_start=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_start
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,$p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    -[0-9] | -[0-9][0-9] | -[0-9][0-9][0-9] | -[0-9][0-9][0-9][0-9])
	at_range_end=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '1,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    [0-9]-[0-9] | [0-9]-[0-9][0-9] | [0-9]-[0-9][0-9][0-9] | \
    [0-9]-[0-9][0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9] | \
    [0-9][0-9]-[0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] )
	at_range_start=`expr $at_option : '\(.*\)-'`
	at_range_end=`expr $at_option : '.*-\(.*\)'`
	if test $at_range_start -gt $at_range_end; then
	  at_tmp=$at_range_end
	  at_range_end=$at_range_start
	  at_range_start=$at_tmp
	fi
	at_fn_validate_ranges at_range_start at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    # Directory selection.
    --directory | -C )
	at_prev=--directory
	;;
    --directory=* )
	at_change_dir=:
	at_dir=$at_optarg
	if test x- = "x$at_dir" ; then
	  at_dir=./-
	fi
	;;

    # Parallel execution.
    --jobs | -j )
	at_jobs=0
	;;
    --jobs=* | -j[0-9]* )
	if test -n "$at_optarg"; then
	  at_jobs=$at_optarg
	else
	  at_jobs=`expr X$at_option : 'X-j\(.*\)'`
	fi
	case $at_jobs in *[!0-9]*)
	  at_optname=`echo " $at_option" | sed 's/^ //; s/[0-9=].*//'`
	  as_fn_error $? "non-numeric argument to $at_optname: $at_jobs" ;;
	esac
	;;

    # Keywords.
    --keywords | -k )
	at_prev=--keywords
	;;
    --keywords=* )
	at_groups_selected=$at_help_all
	at_save_IFS=$IFS
	IFS=,
	set X $at_optarg
	shift
	IFS=$at_save_IFS
	for at_keyword
	do
	  at_invert=
	  case $at_keyword in
	  '!'*)
	    at_invert="-v"
	    at_keyword=`expr "X$at_keyword" : 'X!\(.*\)'`
	    ;;
	  esac
	  # It is on purpose that we match the test group titles too.
	  at_groups_selected=`$as_echo "$at_groups_selected" |
	      grep -i $at_invert "^[1-9][^;]*;.*[; ]$at_keyword[ ;]"`
	done
	# Smash the keywords.
	at_groups_selected=`$as_echo "$at_groups_selected" | sed 's/;.*//'`
	as_fn_append at_groups "$at_groups_selected$as_nl"
	;;
    --recheck)
	at_recheck=:
	;;

    *=*)
	at_envvar=`expr "x$at_option" : 'x\([^=]*\)='`
	# Reject names that are not valid shell variable names.
	case $at_envvar in
	  '' | [0-9]* | *[!_$as_cr_alnum]* )
	    as_fn_error $? "invalid variable name: \`$at_envvar'" ;;
	esac
	at_value=`$as_echo "$at_optarg" | sed "s/'/'\\\\\\\\''/g"`
	# Export now, but save eval for later and for debug scripts.
	export $at_envvar
	as_fn_append at_debug_args " $at_envvar='$at_value'"
	;;

     *) $as_echo "$as_me: invalid option: $at_option" >&2
	$as_echo "Try \`$0 --help' for more information." >&2
	exit 1
	;;
  esac
done

# Verify our last option didn't require an argument
if test -n "$at_prev"; then :
  as_fn_error $? "\`$at_prev' requires an argument"
fi

# The file containing the suite.
at_suite_log=$at_dir/$as_me.log

# Selected test groups.
if test -z "$at_groups$at_recheck"; then
  at_groups=$at_groups_all
else
  if test -n "$at_recheck" && test -r "$at_suite_log"; then
    at_oldfails=`sed -n '
      /^Failed tests:$/,/^Skipped tests:$/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^Unexpected passes:$/,/^## Detailed failed tests/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^## Detailed failed tests/q
      ' "$at_suite_log"`
    as_fn_append at_groups "$at_oldfails$as_nl"
  fi
  # Sort the tests, removing duplicates.
  at_groups=`$as_echo "$at_groups" | sort -nu | sed '/^$/d'`
fi

if test x"$at_color" = xalways \
   || { test x"$at_color" = xauto && test -t 1; }; then
  at_red=`printf '\033[0;31m'`
  at_grn=`printf '\033[0;32m'`
  at_lgn=`printf '\033[1;32m'`
  at_blu=`printf '\033[1;34m'`
  at_std=`printf '\033[m'`
else
  at_red= at_grn= at_lgn= at_blu= at_std=
fi

# Help message.
if $at_help_p; then
  cat <<_ATEOF || at_write_fail=1
Usage: $0 [OPTION]... [VARIABLE=VALUE]... [TESTS]

Run all the tests, or the selected TESTS, given by numeric ranges, and
save a detailed log file.  Upon failure, create debugging scripts.

Do not change environment variables directly.  Instead, set them via
command line arguments.  Set \`AUTOTEST_PATH' to select the executables
to exercise.  Each relative directory is expanded as build and source
directories relative to the top level of this distribution.
E.g., from within the build directory /tmp/foo-1.0, invoking this:

  $ $0 AUTOTEST_PATH=bin

is equivalent to the following, assuming the source directory is /src/foo-1.0:

  PATH=/tmp/foo-1.0/bin:/src/foo-1.0/bin:\$PATH $0
_ATEOF
cat <<_ATEOF || at_write_fail=1

Operation modes:
  -h, --help     print the help message, then exit
  -V, --version  print version number, then exit
  -c, --clean    remove all the files this test suite might create and exit
  -l, --list     describes all the tests, or the selected TESTS
_ATEOF
cat <<_ATEOF || at_write_fail=1

Execution tuning:
  -C, --directory=DIR
                 change to directory DIR before starting
      --color[=never|auto|always]
                 disable colored test results, or enable even without terminal
  -j, --jobs[=N]
                 Allow N jobs at once; infinite jobs with no arg (default 1)
  -k, --keywords=KEYWORDS
                 select the tests matching all the comma-separated KEYWORDS
                 multiple \`-k' accumulate; prefixed \`!' negates a KEYWORD
      --recheck  select all tests that failed or passed unexpectedly last time
  -e, --errexit  abort as soon as a test fails; implies --debug
  -v, --verbose  force more detailed output
                 default for debugging scripts
  -d, --debug    inhibit clean up and top-level logging
                 default for debugging scripts
  -x, --trace    enable tests shell tracing
_ATEOF
cat <<_ATEOF || at_write_fail=1

Report bugs to <https://github.com/firewalld/firewalld>.
firewalld home page: <http://firewalld.org/>.
_ATEOF
  exit $at_write_fail
fi

# List of tests.
if $at_list_p; then
  cat <<_ATEOF || at_write_fail=1
firewalld 0.7.2 test suite test groups:

 NUM: FILE-NAME:LINE     TEST-GROUP-NAME
      KEYWORDS

_ATEOF
  # Pass an empty line as separator between selected groups and help.
  $as_echo "$at_groups$as_nl$as_nl$at_help_all" |
    awk 'NF == 1 && FS != ";" {
	   selected[$ 1] = 1
	   next
	 }
	 /^$/ { FS = ";" }
	 NF > 0 {
	   if (selected[$ 1]) {
	     printf " %3d: %-18s %s\n", $ 1, $ 2, $ 3
	     if ($ 4) {
	       lmax = 79
	       indent = "     "
	       line = indent
	       len = length (line)
	       n = split ($ 4, a, " ")
	       for (i = 1; i <= n; i++) {
		 l = length (a[i]) + 1
		 if (i > 1 && len + l > lmax) {
		   print line
		   line = indent " " a[i]
		   len = length (line)
		 } else {
		   line = line " " a[i]
		   len += l
		 }
	       }
	       if (n)
		 print line
	     }
	   }
	 }' || at_write_fail=1
  exit $at_write_fail
fi
if $at_version_p; then
  $as_echo "$as_me (firewalld 0.7.2)" &&
  cat <<\_ATEOF || at_write_fail=1

Copyright (C) 2012 Free Software Foundation, Inc.
This test suite is free software; the Free Software Foundation gives
unlimited permission to copy, distribute and modify it.
_ATEOF
  exit $at_write_fail
fi

# Should we print banners?  Yes if more than one test is run.
case $at_groups in #(
  *$as_nl* )
      at_print_banners=: ;; #(
  * ) at_print_banners=false ;;
esac
# Text for banner N, set to a single space once printed.
# Banner 1. firewall-offline-cmd.at:1
# Category starts at test group 1.
at_banner_text_1="firewall-offline-cmd"
# Banner 2. dbus.at:1
# Category starts at test group 29.
at_banner_text_2="dbus"
# Banner 3. firewall-cmd.at:1
# Category starts at test group 31.
at_banner_text_3="firewall-cmd (nftables)"
# Banner 4. regression.at:1
# Category starts at test group 58.
at_banner_text_4="regression (nftables)"
# Banner 5. python.at:1
# Category starts at test group 83.
at_banner_text_5="python (nftables)"
# Banner 6. features.at:1
# Category starts at test group 87.
at_banner_text_6="features (nftables)"
# Banner 7. firewall-cmd.at:1
# Category starts at test group 90.
at_banner_text_7="firewall-cmd (iptables)"
# Banner 8. regression.at:1
# Category starts at test group 117.
at_banner_text_8="regression (iptables)"
# Banner 9. python.at:1
# Category starts at test group 141.
at_banner_text_9="python (iptables)"
# Banner 10. features.at:1
# Category starts at test group 145.
at_banner_text_10="features (iptables)"

# Take any -C into account.
if $at_change_dir ; then
  test x != "x$at_dir" && cd "$at_dir" \
    || as_fn_error $? "unable to change directory"
  at_dir=`pwd`
fi

# Load the config files for any default variable assignments.
for at_file in atconfig atlocal
do
  test -r $at_file || continue
  . ./$at_file || as_fn_error $? "invalid content: $at_file"
done

# Autoconf <=2.59b set at_top_builddir instead of at_top_build_prefix:
: "${at_top_build_prefix=$at_top_builddir}"

# Perform any assignments requested during argument parsing.
eval "$at_debug_args"

# atconfig delivers names relative to the directory the test suite is
# in, but the groups themselves are run in testsuite-dir/group-dir.
if test -n "$at_top_srcdir"; then
  builddir=../..
  for at_dir_var in srcdir top_srcdir top_build_prefix
  do
    eval at_val=\$at_$at_dir_var
    case $at_val in
      [\\/$]* | ?:[\\/]* ) at_prefix= ;;
      *) at_prefix=../../ ;;
    esac
    eval "$at_dir_var=\$at_prefix\$at_val"
  done
fi

## -------------------- ##
## Directory structure. ##
## -------------------- ##

# This is the set of directories and files used by this script
# (non-literals are capitalized):
#
# TESTSUITE         - the testsuite
# TESTSUITE.log     - summarizes the complete testsuite run
# TESTSUITE.dir/    - created during a run, remains after -d or failed test
# + at-groups/      - during a run: status of all groups in run
# | + NNN/          - during a run: meta-data about test group NNN
# | | + check-line  - location (source file and line) of current AT_CHECK
# | | + status      - exit status of current AT_CHECK
# | | + stdout      - stdout of current AT_CHECK
# | | + stder1      - stderr, including trace
# | | + stderr      - stderr, with trace filtered out
# | | + test-source - portion of testsuite that defines group
# | | + times       - timestamps for computing duration
# | | + pass        - created if group passed
# | | + xpass       - created if group xpassed
# | | + fail        - created if group failed
# | | + xfail       - created if group xfailed
# | | + skip        - created if group skipped
# + at-stop         - during a run: end the run if this file exists
# + at-source-lines - during a run: cache of TESTSUITE line numbers for extraction
# + 0..NNN/         - created for each group NNN, remains after -d or failed test
# | + TESTSUITE.log - summarizes the group results
# | + ...           - files created during the group

# The directory the whole suite works in.
# Should be absolute to let the user `cd' at will.
at_suite_dir=$at_dir/$as_me.dir
# The file containing the suite ($at_dir might have changed since earlier).
at_suite_log=$at_dir/$as_me.log
# The directory containing helper files per test group.
at_helper_dir=$at_suite_dir/at-groups
# Stop file: if it exists, do not start new jobs.
at_stop_file=$at_suite_dir/at-stop
# The fifo used for the job dispatcher.
at_job_fifo=$at_suite_dir/at-job-fifo

if $at_clean; then
  test -d "$at_suite_dir" &&
    find "$at_suite_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
  rm -f -r "$at_suite_dir" "$at_suite_log"
  exit $?
fi

# Don't take risks: use only absolute directories in PATH.
#
# For stand-alone test suites (ie. atconfig was not found),
# AUTOTEST_PATH is relative to `.'.
#
# For embedded test suites, AUTOTEST_PATH is relative to the top level
# of the package.  Then expand it into build/src parts, since users
# may create executables in both places.
AUTOTEST_PATH=`$as_echo "$AUTOTEST_PATH" | sed "s|:|$PATH_SEPARATOR|g"`
at_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $AUTOTEST_PATH $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -n "$at_path" && as_fn_append at_path $PATH_SEPARATOR
case $as_dir in
  [\\/]* | ?:[\\/]* )
    as_fn_append at_path "$as_dir"
    ;;
  * )
    if test -z "$at_top_build_prefix"; then
      # Stand-alone test suite.
      as_fn_append at_path "$as_dir"
    else
      # Embedded test suite.
      as_fn_append at_path "$at_top_build_prefix$as_dir$PATH_SEPARATOR"
      as_fn_append at_path "$at_top_srcdir/$as_dir"
    fi
    ;;
esac
  done
IFS=$as_save_IFS


# Now build and simplify PATH.
#
# There might be directories that don't exist, but don't redirect
# builtins' (eg., cd) stderr directly: Ultrix's sh hates that.
at_new_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $at_path
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -d "$as_dir" || continue
case $as_dir in
  [\\/]* | ?:[\\/]* ) ;;
  * ) as_dir=`(cd "$as_dir" && pwd) 2>/dev/null` ;;
esac
case $PATH_SEPARATOR$at_new_path$PATH_SEPARATOR in
  *$PATH_SEPARATOR$as_dir$PATH_SEPARATOR*) ;;
  $PATH_SEPARATOR$PATH_SEPARATOR) at_new_path=$as_dir ;;
  *) as_fn_append at_new_path "$PATH_SEPARATOR$as_dir" ;;
esac
  done
IFS=$as_save_IFS

PATH=$at_new_path
export PATH

# Setting up the FDs.



# 5 is the log file.  Not to be overwritten if `-d'.
if $at_debug_p; then
  at_suite_log=/dev/null
else
  : >"$at_suite_log"
fi
exec 5>>"$at_suite_log"

# Banners and logs.
$as_echo "## --------------------------- ##
## firewalld 0.7.2 test suite. ##
## --------------------------- ##"
{
  $as_echo "## --------------------------- ##
## firewalld 0.7.2 test suite. ##
## --------------------------- ##"
  echo

  $as_echo "$as_me: command line was:"
  $as_echo "  \$ $0 $at_cli_args"
  echo

  # If ChangeLog exists, list a few lines in case it might help determining
  # the exact version.
  if test -n "$at_top_srcdir" && test -f "$at_top_srcdir/ChangeLog"; then
    $as_echo "## ---------- ##
## ChangeLog. ##
## ---------- ##"
    echo
    sed 's/^/| /;10q' "$at_top_srcdir/ChangeLog"
    echo
  fi

  {
cat <<_ASUNAME
## --------- ##
## Platform. ##
## --------- ##

hostname = `(hostname || uname -n) 2>/dev/null | sed 1q`
uname -m = `(uname -m) 2>/dev/null || echo unknown`
uname -r = `(uname -r) 2>/dev/null || echo unknown`
uname -s = `(uname -s) 2>/dev/null || echo unknown`
uname -v = `(uname -v) 2>/dev/null || echo unknown`

/usr/bin/uname -p = `(/usr/bin/uname -p) 2>/dev/null || echo unknown`
/bin/uname -X     = `(/bin/uname -X) 2>/dev/null     || echo unknown`

/bin/arch              = `(/bin/arch) 2>/dev/null              || echo unknown`
/usr/bin/arch -k       = `(/usr/bin/arch -k) 2>/dev/null       || echo unknown`
/usr/convex/getsysinfo = `(/usr/convex/getsysinfo) 2>/dev/null || echo unknown`
/usr/bin/hostinfo      = `(/usr/bin/hostinfo) 2>/dev/null      || echo unknown`
/bin/machine           = `(/bin/machine) 2>/dev/null           || echo unknown`
/usr/bin/oslevel       = `(/usr/bin/oslevel) 2>/dev/null       || echo unknown`
/bin/universe          = `(/bin/universe) 2>/dev/null          || echo unknown`

_ASUNAME

as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    $as_echo "PATH: $as_dir"
  done
IFS=$as_save_IFS

}
  echo

  # Contents of the config files.
  for at_file in atconfig atlocal
  do
    test -r $at_file || continue
    $as_echo "$as_me: $at_file:"
    sed 's/^/| /' $at_file
    echo
  done
} >&5


## ------------------------- ##
## Autotest shell functions. ##
## ------------------------- ##

# at_fn_banner NUMBER
# -------------------
# Output banner NUMBER, provided the testsuite is running multiple groups and
# this particular banner has not yet been printed.
at_fn_banner ()
{
  $at_print_banners || return 0
  eval at_banner_text=\$at_banner_text_$1
  test "x$at_banner_text" = "x " && return 0
  eval "at_banner_text_$1=\" \""
  if test -z "$at_banner_text"; then
    $at_first || echo
  else
    $as_echo "$as_nl$at_banner_text$as_nl"
  fi
} # at_fn_banner

# at_fn_check_prepare_notrace REASON LINE
# ---------------------------------------
# Perform AT_CHECK preparations for the command at LINE for an untraceable
# command; REASON is the reason for disabling tracing.
at_fn_check_prepare_notrace ()
{
  $at_trace_echo "Not enabling shell tracing (command contains $1)"
  $as_echo "$2" >"$at_check_line_file"
  at_check_trace=: at_check_filter=:
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_trace LINE
# ------------------------------
# Perform AT_CHECK preparations for the command at LINE for a traceable
# command.
at_fn_check_prepare_trace ()
{
  $as_echo "$1" >"$at_check_line_file"
  at_check_trace=$at_traceon at_check_filter=$at_check_filter_trace
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_dynamic COMMAND LINE
# ----------------------------------------
# Decide if COMMAND at LINE is traceable at runtime, and call the appropriate
# preparation function.
at_fn_check_prepare_dynamic ()
{
  case $1 in
    *$as_nl*)
      at_fn_check_prepare_notrace 'an embedded newline' "$2" ;;
    *)
      at_fn_check_prepare_trace "$2" ;;
  esac
}

# at_fn_filter_trace
# ------------------
# Remove the lines in the file "$at_stderr" generated by "set -x" and print
# them to stderr.
at_fn_filter_trace ()
{
  mv "$at_stderr" "$at_stder1"
  grep '^ *+' "$at_stder1" >&2
  grep -v '^ *+' "$at_stder1" >"$at_stderr"
}

# at_fn_log_failure FILE-LIST
# ---------------------------
# Copy the files in the list on stdout with a "> " prefix, and exit the shell
# with a failure exit code.
at_fn_log_failure ()
{
  for file
    do $as_echo "$file:"; sed 's/^/> /' "$file"; done
  echo 1 > "$at_status_file"
  exit 1
}

# at_fn_check_skip EXIT-CODE LINE
# -------------------------------
# Check whether EXIT-CODE is a special exit code (77 or 99), and if so exit
# the test group subshell with that same exit code. Use LINE in any report
# about test failure.
at_fn_check_skip ()
{
  case $1 in
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$2: hard failure"; exit 99;;
    77) echo 77 > "$at_status_file"; exit 77;;
  esac
}

# at_fn_check_status EXPECTED EXIT-CODE LINE
# ------------------------------------------
# Check whether EXIT-CODE is the EXPECTED exit code, and if so do nothing.
# Otherwise, if it is 77 or 99, exit the test group subshell with that same
# exit code; if it is anything else print an error message referring to LINE,
# and fail the test.
at_fn_check_status ()
{
  case $2 in
    $1 ) ;;
    77) echo 77 > "$at_status_file"; exit 77;;
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$3: hard failure"; exit 99;;
    *) $as_echo "$3: exit code was $2, expected $1"
      at_failed=:;;
  esac
}

# at_fn_diff_devnull FILE
# -----------------------
# Emit a diff between /dev/null and FILE. Uses "test -s" to avoid useless diff
# invocations.
at_fn_diff_devnull ()
{
  test -s "$1" || return 0
  $at_diff "$at_devnull" "$1"
}

# at_fn_test NUMBER
# -----------------
# Parse out test NUMBER from the tail of this file.
at_fn_test ()
{
  eval at_sed=\$at_sed$1
  sed "$at_sed" "$at_myself" > "$at_test_source"
}

# at_fn_create_debugging_script
# -----------------------------
# Create the debugging script $at_group_dir/run which will reproduce the
# current test group.
at_fn_create_debugging_script ()
{
  {
    echo "#! /bin/sh" &&
    echo 'test "${ZSH_VERSION+set}" = set && alias -g '\''${1+"$@"}'\''='\''"$@"'\''' &&
    $as_echo "cd '$at_dir'" &&
    $as_echo "exec \${CONFIG_SHELL-$SHELL} \"$at_myself\" -v -d $at_debug_args $at_group \${1+\"\$@\"}" &&
    echo 'exit 1'
  } >"$at_group_dir/run" &&
  chmod +x "$at_group_dir/run"
}

## -------------------------------- ##
## End of autotest shell functions. ##
## -------------------------------- ##
{
  $as_echo "## ---------------- ##
## Tested programs. ##
## ---------------- ##"
  echo
} >&5

# Report what programs are being tested.
for at_program in : $at_tested
do
  test "$at_program" = : && continue
  case $at_program in
    [\\/]* | ?:[\\/]* ) $at_program_=$at_program ;;
    * )
    as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -f "$as_dir/$at_program" && break
  done
IFS=$as_save_IFS

    at_program_=$as_dir/$at_program ;;
  esac
  if test -f "$at_program_"; then
    {
      $as_echo "$at_srcdir/testsuite.at:1: $at_program_ --version"
      "$at_program_" --version </dev/null
      echo
    } >&5 2>&1
  else
    as_fn_error $? "cannot find $at_program" "$LINENO" 5
  fi
done

{
  $as_echo "## ------------------ ##
## Running the tests. ##
## ------------------ ##"
} >&5

at_start_date=`date`
at_start_time=`date +%s 2>/dev/null`
$as_echo "$as_me: starting at: $at_start_date" >&5

# Create the master directory if it doesn't already exist.
as_dir="$at_suite_dir"; as_fn_mkdir_p ||
  as_fn_error $? "cannot create \`$at_suite_dir'" "$LINENO" 5

# Can we diff with `/dev/null'?  DU 5.0 refuses.
if diff /dev/null /dev/null >/dev/null 2>&1; then
  at_devnull=/dev/null
else
  at_devnull=$at_suite_dir/devnull
  >"$at_devnull"
fi

# Use `diff -u' when possible.
if at_diff=`diff -u "$at_devnull" "$at_devnull" 2>&1` && test -z "$at_diff"
then
  at_diff='diff -u'
else
  at_diff=diff
fi

# Get the last needed group.
for at_group in : $at_groups; do :; done

# Extract the start and end lines of each test group at the tail
# of this file
awk '
BEGIN { FS="" }
/^#AT_START_/ {
  start = NR
}
/^#AT_STOP_/ {
  test = substr ($ 0, 10)
  print "at_sed" test "=\"1," start "d;" (NR-1) "q\""
  if (test == "'"$at_group"'") exit
}' "$at_myself" > "$at_suite_dir/at-source-lines" &&
. "$at_suite_dir/at-source-lines" ||
  as_fn_error $? "cannot create test line number cache" "$LINENO" 5
rm -f "$at_suite_dir/at-source-lines"

# Set number of jobs for `-j'; avoid more jobs than test groups.
set X $at_groups; shift; at_max_jobs=$#
if test $at_max_jobs -eq 0; then
  at_jobs=1
fi
if test $at_jobs -ne 1 &&
   { test $at_jobs -eq 0 || test $at_jobs -gt $at_max_jobs; }; then
  at_jobs=$at_max_jobs
fi

# If parallel mode, don't output banners, don't split summary lines.
if test $at_jobs -ne 1; then
  at_print_banners=false
  at_quiet=:
fi

# Set up helper dirs.
rm -rf "$at_helper_dir" &&
mkdir "$at_helper_dir" &&
cd "$at_helper_dir" &&
{ test -z "$at_groups" || mkdir $at_groups; } ||
as_fn_error $? "testsuite directory setup failed" "$LINENO" 5

# Functions for running a test group.  We leave the actual
# test group execution outside of a shell function in order
# to avoid hitting zsh 4.x exit status bugs.

# at_fn_group_prepare
# -------------------
# Prepare for running a test group.
at_fn_group_prepare ()
{
  # The directory for additional per-group helper files.
  at_job_dir=$at_helper_dir/$at_group
  # The file containing the location of the last AT_CHECK.
  at_check_line_file=$at_job_dir/check-line
  # The file containing the exit status of the last command.
  at_status_file=$at_job_dir/status
  # The files containing the output of the tested commands.
  at_stdout=$at_job_dir/stdout
  at_stder1=$at_job_dir/stder1
  at_stderr=$at_job_dir/stderr
  # The file containing the code for a test group.
  at_test_source=$at_job_dir/test-source
  # The file containing dates.
  at_times_file=$at_job_dir/times

  # Be sure to come back to the top test directory.
  cd "$at_suite_dir"

  # Clearly separate the test groups when verbose.
  $at_first || $at_verbose echo

  at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'


  # Create a fresh directory for the next test group, and enter.
  # If one already exists, the user may have invoked ./run from
  # within that directory; we remove the contents, but not the
  # directory itself, so that we aren't pulling the rug out from
  # under the shell's notion of the current directory.
  at_group_dir=$at_suite_dir/$at_group_normalized
  at_group_log=$at_group_dir/$as_me.log
  if test -d "$at_group_dir"; then
  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx {} \;
  rm -fr "$at_group_dir"/* "$at_group_dir"/.[!.] "$at_group_dir"/.??*
fi ||
    { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: test directory for $at_group_normalized could not be cleaned" >&5
$as_echo "$as_me: WARNING: test directory for $at_group_normalized could not be cleaned" >&2;}
  # Be tolerant if the above `rm' was not able to remove the directory.
  as_dir="$at_group_dir"; as_fn_mkdir_p

  echo 0 > "$at_status_file"

  # In verbose mode, append to the log file *and* show on
  # the standard output; in quiet mode only write to the log.
  if test -z "$at_verbose"; then
    at_tee_pipe='tee -a "$at_group_log"'
  else
    at_tee_pipe='cat >> "$at_group_log"'
  fi
}

# at_fn_group_banner ORDINAL LINE DESC PAD [BANNER]
# -------------------------------------------------
# Declare the test group ORDINAL, located at LINE with group description DESC,
# and residing under BANNER. Use PAD to align the status column.
at_fn_group_banner ()
{
  at_setup_line="$2"
  test -n "$5" && at_fn_banner $5
  at_desc="$3"
  case $1 in
    [0-9])      at_desc_line="  $1: ";;
    [0-9][0-9]) at_desc_line=" $1: " ;;
    *)          at_desc_line="$1: "  ;;
  esac
  as_fn_append at_desc_line "$3$4"
  $at_quiet $as_echo_n "$at_desc_line"
  echo "#                             -*- compilation -*-" >> "$at_group_log"
}

# at_fn_group_postprocess
# -----------------------
# Perform cleanup after running a test group.
at_fn_group_postprocess ()
{
  # Be sure to come back to the suite directory, in particular
  # since below we might `rm' the group directory we are in currently.
  cd "$at_suite_dir"

  if test ! -f "$at_check_line_file"; then
    sed "s/^ */$as_me: WARNING: /" <<_ATEOF
      A failure happened in a test group before any test could be
      run. This means that test suite is improperly designed.  Please
      report this failure to <https://github.com/firewalld/firewalld>.
_ATEOF
    $as_echo "$at_setup_line" >"$at_check_line_file"
    at_status=99
  fi
  $at_verbose $as_echo_n "$at_group. $at_setup_line: "
  $as_echo_n "$at_group. $at_setup_line: " >> "$at_group_log"
  case $at_xfail:$at_status in
    yes:0)
	at_msg="UNEXPECTED PASS"
	at_res=xpass
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    no:0)
	at_msg="ok"
	at_res=pass
	at_errexit=false
	at_color=$at_grn
	;;
    *:77)
	at_msg='skipped ('`cat "$at_check_line_file"`')'
	at_res=skip
	at_errexit=false
	at_color=$at_blu
	;;
    no:* | *:99)
	at_msg='FAILED ('`cat "$at_check_line_file"`')'
	at_res=fail
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    yes:*)
	at_msg='expected failure ('`cat "$at_check_line_file"`')'
	at_res=xfail
	at_errexit=false
	at_color=$at_lgn
	;;
  esac
  echo "$at_res" > "$at_job_dir/$at_res"
  # In parallel mode, output the summary line only afterwards.
  if test $at_jobs -ne 1 && test -n "$at_verbose"; then
    $as_echo "$at_desc_line $at_color$at_msg$at_std"
  else
    # Make sure there is a separator even with long titles.
    $as_echo " $at_color$at_msg$at_std"
  fi
  at_log_msg="$at_group. $at_desc ($at_setup_line): $at_msg"
  case $at_status in
    0|77)
      # $at_times_file is only available if the group succeeded.
      # We're not including the group log, so the success message
      # is written in the global log separately.  But we also
      # write to the group log in case they're using -d.
      if test -f "$at_times_file"; then
	at_log_msg="$at_log_msg     ("`sed 1d "$at_times_file"`')'
	rm -f "$at_times_file"
      fi
      $as_echo "$at_log_msg" >> "$at_group_log"
      $as_echo "$at_log_msg" >&5

      # Cleanup the group directory, unless the user wants the files
      # or the success was unexpected.
      if $at_debug_p || test $at_res = xpass; then
	at_fn_create_debugging_script
	if test $at_res = xpass && $at_errexit; then
	  echo stop > "$at_stop_file"
	fi
      else
	if test -d "$at_group_dir"; then
	  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
	  rm -fr "$at_group_dir"
	fi
	rm -f "$at_test_source"
      fi
      ;;
    *)
      # Upon failure, include the log into the testsuite's global
      # log.  The failure message is written in the group log.  It
      # is later included in the global log.
      $as_echo "$at_log_msg" >> "$at_group_log"

      # Upon failure, keep the group directory for autopsy, and create
      # the debugging script.  With -e, do not start any further tests.
      at_fn_create_debugging_script
      if $at_errexit; then
	echo stop > "$at_stop_file"
      fi
      ;;
  esac
}


## ------------ ##
## Driver loop. ##
## ------------ ##


if (set -m && set +m && set +b) >/dev/null 2>&1; then
  set +b
  at_job_control_on='set -m' at_job_control_off='set +m' at_job_group=-
else
  at_job_control_on=: at_job_control_off=: at_job_group=
fi

for at_signal in 1 2 15; do
  trap 'set +x; set +e
	$at_job_control_off
	at_signal='"$at_signal"'
	echo stop > "$at_stop_file"
	trap "" $at_signal
	at_pgids=
	for at_pgid in `jobs -p 2>/dev/null`; do
	  at_pgids="$at_pgids $at_job_group$at_pgid"
	done
	test -z "$at_pgids" || kill -$at_signal $at_pgids 2>/dev/null
	wait
	if test "$at_jobs" -eq 1 || test -z "$at_verbose"; then
	  echo >&2
	fi
	at_signame=`kill -l $at_signal 2>&1 || echo $at_signal`
	set x $at_signame
	test 0 -gt 2 && at_signame=$at_signal
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: caught signal $at_signame, bailing out" >&5
$as_echo "$as_me: WARNING: caught signal $at_signame, bailing out" >&2;}
	as_fn_arith 128 + $at_signal && exit_status=$as_val
	as_fn_exit $exit_status' $at_signal
done

rm -f "$at_stop_file"
at_first=:

if test $at_jobs -ne 1 &&
     rm -f "$at_job_fifo" &&
     test -n "$at_job_group" &&
     ( mkfifo "$at_job_fifo" && trap 'exit 1' PIPE STOP TSTP ) 2>/dev/null
then
  # FIFO job dispatcher.

  trap 'at_pids=
	for at_pid in `jobs -p`; do
	  at_pids="$at_pids $at_job_group$at_pid"
	done
	if test -n "$at_pids"; then
	  at_sig=TSTP
	  test "${TMOUT+set}" = set && at_sig=STOP
	  kill -$at_sig $at_pids 2>/dev/null
	fi
	kill -STOP $$
	test -z "$at_pids" || kill -CONT $at_pids 2>/dev/null' TSTP

  echo
  # Turn jobs into a list of numbers, starting from 1.
  at_joblist=`$as_echo "$at_groups" | sed -n 1,${at_jobs}p`

  set X $at_joblist
  shift
  for at_group in $at_groups; do
    $at_job_control_on 2>/dev/null
    (
      # Start one test group.
      $at_job_control_off
      if $at_first; then
	exec 7>"$at_job_fifo"
      else
	exec 6<&-
      fi
      trap 'set +x; set +e
	    trap "" PIPE
	    echo stop > "$at_stop_file"
	    echo >&7
	    as_fn_exit 141' PIPE
      at_fn_group_prepare
      if cd "$at_group_dir" &&
	 at_fn_test $at_group &&
	 . "$at_test_source"
      then :; else
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
	at_failed=:
      fi
      at_fn_group_postprocess
      echo >&7
    ) &
    $at_job_control_off
    if $at_first; then
      at_first=false
      exec 6<"$at_job_fifo" 7>"$at_job_fifo"
    fi
    shift # Consume one token.
    if test $# -gt 0; then :; else
      read at_token <&6 || break
      set x $*
    fi
    test -f "$at_stop_file" && break
  done
  exec 7>&-
  # Read back the remaining ($at_jobs - 1) tokens.
  set X $at_joblist
  shift
  if test $# -gt 0; then
    shift
    for at_job
    do
      read at_token
    done <&6
  fi
  exec 6<&-
  wait
else
  # Run serially, avoid forks and other potential surprises.
  for at_group in $at_groups; do
    at_fn_group_prepare
    if cd "$at_group_dir" &&
       at_fn_test $at_group &&
       . "$at_test_source"; then :; else
      { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
      at_failed=:
    fi
    at_fn_group_postprocess
    test -f "$at_stop_file" && break
    at_first=false
  done
fi

# Wrap up the test suite with summary statistics.
cd "$at_helper_dir"

# Use ?..???? when the list must remain sorted, the faster * otherwise.
at_pass_list=`for f in */pass; do echo $f; done | sed '/\*/d; s,/pass,,'`
at_skip_list=`for f in */skip; do echo $f; done | sed '/\*/d; s,/skip,,'`
at_xfail_list=`for f in */xfail; do echo $f; done | sed '/\*/d; s,/xfail,,'`
at_xpass_list=`for f in ?/xpass ??/xpass ???/xpass ????/xpass; do
		 echo $f; done | sed '/?/d; s,/xpass,,'`
at_fail_list=`for f in ?/fail ??/fail ???/fail ????/fail; do
		echo $f; done | sed '/?/d; s,/fail,,'`

set X $at_pass_list $at_xpass_list $at_xfail_list $at_fail_list $at_skip_list
shift; at_group_count=$#
set X $at_xpass_list; shift; at_xpass_count=$#; at_xpass_list=$*
set X $at_xfail_list; shift; at_xfail_count=$#
set X $at_fail_list; shift; at_fail_count=$#; at_fail_list=$*
set X $at_skip_list; shift; at_skip_count=$#

as_fn_arith $at_group_count - $at_skip_count && at_run_count=$as_val
as_fn_arith $at_xpass_count + $at_fail_count && at_unexpected_count=$as_val
as_fn_arith $at_xfail_count + $at_fail_count && at_total_fail_count=$as_val

# Back to the top directory.
cd "$at_dir"
rm -rf "$at_helper_dir"

# Compute the duration of the suite.
at_stop_date=`date`
at_stop_time=`date +%s 2>/dev/null`
$as_echo "$as_me: ending at: $at_stop_date" >&5
case $at_start_time,$at_stop_time in
  [0-9]*,[0-9]*)
    as_fn_arith $at_stop_time - $at_start_time && at_duration_s=$as_val
    as_fn_arith $at_duration_s / 60 && at_duration_m=$as_val
    as_fn_arith $at_duration_m / 60 && at_duration_h=$as_val
    as_fn_arith $at_duration_s % 60 && at_duration_s=$as_val
    as_fn_arith $at_duration_m % 60 && at_duration_m=$as_val
    at_duration="${at_duration_h}h ${at_duration_m}m ${at_duration_s}s"
    $as_echo "$as_me: test suite duration: $at_duration" >&5
    ;;
esac

echo
$as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
echo
{
  echo
  $as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
  echo
} >&5

if test $at_run_count = 1; then
  at_result="1 test"
  at_were=was
else
  at_result="$at_run_count tests"
  at_were=were
fi
if $at_errexit_p && test $at_unexpected_count != 0; then
  if test $at_xpass_count = 1; then
    at_result="$at_result $at_were run, one passed"
  else
    at_result="$at_result $at_were run, one failed"
  fi
  at_result="$at_result unexpectedly and inhibited subsequent tests."
  at_color=$at_red
else
  # Don't you just love exponential explosion of the number of cases?
  at_color=$at_red
  case $at_xpass_count:$at_fail_count:$at_xfail_count in
    # So far, so good.
    0:0:0) at_result="$at_result $at_were successful." at_color=$at_grn ;;
    0:0:*) at_result="$at_result behaved as expected." at_color=$at_lgn ;;

    # Some unexpected failures
    0:*:0) at_result="$at_result $at_were run,
$at_fail_count failed unexpectedly." ;;

    # Some failures, both expected and unexpected
    0:*:1) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    0:*:*) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;

    # No unexpected failures, but some xpasses
    *:0:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly." ;;

    # No expected failures, but failures and xpasses
    *:1:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failure)." ;;
    *:*:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failures)." ;;

    # All of them.
    *:*:1) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    *:*:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;
  esac

  if test $at_skip_count = 0 && test $at_run_count -gt 1; then
    at_result="All $at_result"
  fi
fi

# Now put skips in the mix.
case $at_skip_count in
  0) ;;
  1) at_result="$at_result
1 test was skipped." ;;
  *) at_result="$at_result
$at_skip_count tests were skipped." ;;
esac

if test $at_unexpected_count = 0; then
  echo "$at_color$at_result$at_std"
  echo "$at_result" >&5
else
  echo "${at_color}ERROR: $at_result$at_std" >&2
  echo "ERROR: $at_result" >&5
  {
    echo
    $as_echo "## ------------------------ ##
## Summary of the failures. ##
## ------------------------ ##"

    # Summary of failed and skipped tests.
    if test $at_fail_count != 0; then
      echo "Failed tests:"
      $SHELL "$at_myself" $at_fail_list --list
      echo
    fi
    if test $at_skip_count != 0; then
      echo "Skipped tests:"
      $SHELL "$at_myself" $at_skip_list --list
      echo
    fi
    if test $at_xpass_count != 0; then
      echo "Unexpected passes:"
      $SHELL "$at_myself" $at_xpass_list --list
      echo
    fi
    if test $at_fail_count != 0; then
      $as_echo "## ---------------------- ##
## Detailed failed tests. ##
## ---------------------- ##"
      echo
      for at_group in $at_fail_list
      do
	at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'

	cat "$at_suite_dir/$at_group_normalized/$as_me.log"
	echo
      done
      echo
    fi
    if test -n "$at_top_srcdir"; then
      sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## ${at_top_build_prefix}config.log ##
_ASBOX
      sed 's/^/| /' ${at_top_build_prefix}config.log
      echo
    fi
  } >&5

  sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## $as_me.log was created. ##
_ASBOX

  echo
  if $at_debug_p; then
    at_msg='per-test log files'
  else
    at_msg="\`${at_testdir+${at_testdir}/}$as_me.log'"
  fi
  $as_echo "Please send $at_msg and all information you think might help:

   To: <https://github.com/firewalld/firewalld>
   Subject: [firewalld 0.7.2] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}

You may investigate any problem if you feel able to do so, in which
case the test suite provides a good starting point.  Its output may
be found below \`${at_testdir+${at_testdir}/}$as_me.dir'.
"
  exit 1
fi

exit 0

## ------------- ##
## Actual tests. ##
## ------------- ##
#AT_START_1
at_fn_group_banner 1 'firewall-cmd.at:5' \
  "basic options" "                                  " 1
at_xfail=no
(
  $as_echo "1. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 " "firewall-cmd.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_1
#AT_START_2
at_fn_group_banner 2 'firewall-cmd.at:28' \
  "get/list options" "                               " 1
at_xfail=no
(
  $as_echo "2. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 " "firewall-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 " "firewall-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 " "firewall-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 " "firewall-cmd.at:40"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 " "firewall-cmd.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_2
#AT_START_3
at_fn_group_banner 3 'firewall-cmd.at:44' \
  "default zone" "                                   " 1
at_xfail=no
(
  $as_echo "3. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\"" "firewall-cmd.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:50"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\"" "firewall-cmd.at:52"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone" "firewall-cmd.at:53"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_3
#AT_START_4
at_fn_group_banner 4 'firewall-cmd.at:56' \
  "user zone" "                                      " 1
at_xfail=no
(
  $as_echo "4. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "firewall-cmd.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 " "firewall-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "firewall-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "firewall-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "firewall-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 " "firewall-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_4
#AT_START_5
at_fn_group_banner 5 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 1
at_xfail=no
(
  $as_echo "5. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone" "firewall-cmd.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone" "firewall-cmd.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 " "firewall-cmd.at:107"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 " "firewall-cmd.at:108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 " "firewall-cmd.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 " "firewall-cmd.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:120"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:127"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 " "firewall-cmd.at:129"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted" "firewall-cmd.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public" "firewall-cmd.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 " "firewall-cmd.at:164"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 " "firewall-cmd.at:165"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_5
#AT_START_6
at_fn_group_banner 6 'firewall-cmd.at:169' \
  "zone sources" "                                   " 1
at_xfail=no
(
  $as_echo "6. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }













      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_6
#AT_START_7
at_fn_group_banner 7 'firewall-cmd.at:221' \
  "services" "                                       " 1
at_xfail=no
(
  $as_echo "7. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 " "firewall-cmd.at:233"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 " "firewall-cmd.at:234"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 " "firewall-cmd.at:236"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 " "firewall-cmd.at:237"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 " "firewall-cmd.at:242"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 " "firewall-cmd.at:243"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 " "firewall-cmd.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 " "firewall-cmd.at:253"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 " "firewall-cmd.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 " "firewall-cmd.at:255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 " "firewall-cmd.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 " "firewall-cmd.at:261"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 " "firewall-cmd.at:262"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_7
#AT_START_8
at_fn_group_banner 8 'firewall-cmd.at:265' \
  "user services" "                                  " 1
at_xfail=no
(
  $as_echo "8. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 " "firewall-cmd.at:268"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 " "firewall-cmd.at:270"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 " "firewall-cmd.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 " "firewall-cmd.at:274"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 " "firewall-cmd.at:275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 " "firewall-cmd.at:276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 " "firewall-cmd.at:277"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:278"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 " "firewall-cmd.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:281"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 " "firewall-cmd.at:282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 " "firewall-cmd.at:283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 " "firewall-cmd.at:284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 " "firewall-cmd.at:286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 " "firewall-cmd.at:287"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 " "firewall-cmd.at:288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:293"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 " "firewall-cmd.at:295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 " "firewall-cmd.at:296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 " "firewall-cmd.at:300"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 " "firewall-cmd.at:301"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 " "firewall-cmd.at:302"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:303"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 " "firewall-cmd.at:304"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:305"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 " "firewall-cmd.at:307"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 " "firewall-cmd.at:308"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 " "firewall-cmd.at:309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 " "firewall-cmd.at:310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 " "firewall-cmd.at:318"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 " "firewall-cmd.at:320"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }





_ATEOF




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_8
#AT_START_9
at_fn_group_banner 9 'firewall-cmd.at:337' \
  "ports" "                                          " 1
at_xfail=no
(
  $as_echo "9. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 " "firewall-cmd.at:361"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 " "firewall-cmd.at:362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 " "firewall-cmd.at:363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 " "firewall-cmd.at:364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 " "firewall-cmd.at:365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 " "firewall-cmd.at:367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 " "firewall-cmd.at:370"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 " "firewall-cmd.at:371"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 " "firewall-cmd.at:372"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 " "firewall-cmd.at:373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 " "firewall-cmd.at:374"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 " "firewall-cmd.at:375"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 " "firewall-cmd.at:376"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 " "firewall-cmd.at:377"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 " "firewall-cmd.at:386"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 " "firewall-cmd.at:387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:388"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 " "firewall-cmd.at:389"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 " "firewall-cmd.at:390"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:391"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_9
#AT_START_10
at_fn_group_banner 10 'firewall-cmd.at:394' \
  "source ports" "                                   " 1
at_xfail=no
(
  $as_echo "10. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 " "firewall-cmd.at:407"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 " "firewall-cmd.at:408"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 " "firewall-cmd.at:409"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 " "firewall-cmd.at:410"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 " "firewall-cmd.at:411"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:412"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 " "firewall-cmd.at:413"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:414"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 " "firewall-cmd.at:423"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 " "firewall-cmd.at:424"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:425"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 " "firewall-cmd.at:426"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 " "firewall-cmd.at:427"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:428"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_10
#AT_START_11
at_fn_group_banner 11 'firewall-cmd.at:431' \
  "protocols" "                                      " 1
at_xfail=no
(
  $as_echo "11. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 " "firewall-cmd.at:439"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 " "firewall-cmd.at:440"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:441"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 " "firewall-cmd.at:442"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:443"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:451"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 " "firewall-cmd.at:452"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:453"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 " "firewall-cmd.at:454"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 " "firewall-cmd.at:455"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:456"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_11
#AT_START_12
at_fn_group_banner 12 'firewall-cmd.at:459' \
  "masquerade" "                                     " 1
at_xfail=no
(
  $as_echo "12. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 " "firewall-cmd.at:486"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:487: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:487"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 " "firewall-cmd.at:488"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:489"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_12
#AT_START_13
at_fn_group_banner 13 'firewall-cmd.at:492' \
  "forward ports" "                                  " 1
at_xfail=no
(
  $as_echo "13. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi









































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:580: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 " "firewall-cmd.at:580"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:580"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:581: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 " "firewall-cmd.at:581"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 " "firewall-cmd.at:582"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:583: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 " "firewall-cmd.at:583"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 " "firewall-cmd.at:584"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 " "firewall-cmd.at:585"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:586: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:586"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:586"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:587"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:588"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:589"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:590"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:591"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:592"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:593"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 " "firewall-cmd.at:594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:600"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 " "firewall-cmd.at:601"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 " "firewall-cmd.at:602"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:603: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:603"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:603"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:604"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:605"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 " "firewall-cmd.at:606"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_13
#AT_START_14
at_fn_group_banner 14 'firewall-cmd.at:609' \
  "ICMP block" "                                     " 1
at_xfail=no
(
  $as_echo "14. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:609"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 " "firewall-cmd.at:619"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 " "firewall-cmd.at:620"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:621: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:621"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 " "firewall-cmd.at:622"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:623"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:629: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 " "firewall-cmd.at:629"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:629"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:630"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 " "firewall-cmd.at:631"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:632"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:647: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 " "firewall-cmd.at:647"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:647"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:648: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:648"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:648"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:649: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:649"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:649"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:650: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 " "firewall-cmd.at:650"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:650"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:651: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:651"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:651"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:652: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:652"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:652"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_14
#AT_START_15
at_fn_group_banner 15 'firewall-cmd.at:655' \
  "user ICMP types" "                                " 1
at_xfail=no
(
  $as_echo "15. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 " "firewall-cmd.at:658"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 " "firewall-cmd.at:660"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 " "firewall-cmd.at:663"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:664"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:665"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:666: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:666"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:666"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:667"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:668: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:668"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:669"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:671: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 " "firewall-cmd.at:671"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:671"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:672"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 " "firewall-cmd.at:674"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:675"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_15
#AT_START_16
at_fn_group_banner 16 'firewall-cmd.at:678' \
  "ipset" "                                          " 1
at_xfail=no
(
  $as_echo "16. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:678"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:684: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "firewall-cmd.at:684"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:684"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:702"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:706"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 " "firewall-cmd.at:707"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:710: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:710"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:710"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:714: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:714"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:715: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 " "firewall-cmd.at:715"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:715"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:718"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 " "firewall-cmd.at:721"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 " "firewall-cmd.at:721"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:721"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_16
#AT_START_17
at_fn_group_banner 17 'firewall-cmd.at:731' \
  "user helpers" "                                   " 1
at_xfail=no
(
  $as_echo "17. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:731"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 " "firewall-cmd.at:734"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 " "firewall-cmd.at:735"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 " "firewall-cmd.at:738"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 " "firewall-cmd.at:739"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:740"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 " "firewall-cmd.at:741"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:743: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 " "firewall-cmd.at:743"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:743"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:745: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:745"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:745"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 " "firewall-cmd.at:748"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:749"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:750"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 " "firewall-cmd.at:751"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:752"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:753"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:755: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 " "firewall-cmd.at:755"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:756"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_17
#AT_START_18
at_fn_group_banner 18 'firewall-cmd.at:759' \
  "direct" "                                         " 1
at_xfail=no
(
  $as_echo "18. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






























































































































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone" "firewall-cmd.at:802"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 " "firewall-cmd.at:804"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:807"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep \"žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:808"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep \"ipv4 filter žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:809"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:810"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:811"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:814"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:815"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:816"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:817"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:818"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 " "firewall-cmd.at:827"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_18
#AT_START_19
at_fn_group_banner 19 'firewall-cmd.at:832' \
  "direct nat" "                                     " 1
at_xfail=no
(
  $as_echo "19. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:832"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:839"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:840"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:843"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:844"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:845"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:849: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:849"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:849"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_19
#AT_START_20
at_fn_group_banner 20 'firewall-cmd.at:856' \
  "direct passthrough" "                             " 1
at_xfail=no
(
  $as_echo "20. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:856"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:859: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:859"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:859"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 " "firewall-cmd.at:885"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 " "firewall-cmd.at:886"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 " "firewall-cmd.at:887"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep \"\\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:888"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:889"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:890: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:890"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:890"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:891: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 " "firewall-cmd.at:891"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:892: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:892"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:892"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_20
#AT_START_21
at_fn_group_banner 21 'firewall-cmd.at:895' \
  "direct ebtables" "                                " 1
at_xfail=no
(
  $as_echo "21. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:895"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi














































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:930: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 " "firewall-cmd.at:930"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:930"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:931"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:932: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 " "firewall-cmd.at:932"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:932"
$at_failed && at_fn_log_failure
$at_traceon; }




































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_21
#AT_START_22
at_fn_group_banner 22 'firewall-cmd.at:940' \
  "lockdown" "                                       " 1
at_xfail=no
(
  $as_echo "22. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep \"/usr/bin/command\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:959: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:959"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:959"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:960"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:961: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:961"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:961"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:962: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:962"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:962"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:963"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:971"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:972: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:972"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:972"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:973: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep \"6666\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:973"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:973"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:974"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:975"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:976: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 " "firewall-cmd.at:976"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:976"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 " "firewall-cmd.at:983"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:984"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep \"theboss\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:985"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 " "firewall-cmd.at:986"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:987"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "firewall-cmd.at:989" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:989"






























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_22
#AT_START_23
at_fn_group_banner 23 'firewall-cmd.at:1007' \
  "rich rules good" "                                " 1
at_xfail=no
(
  $as_echo "23. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1007"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1010"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1010"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1010"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1010"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1013"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1013"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1013"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1013"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1014"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1014"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1014"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1014"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1015"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1023"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1023"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1023"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1023"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1024"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1024"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1024"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1024"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1025"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1025"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1025"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1025"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1026"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1026"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1026"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1026"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1027"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1027"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1027"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1027"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1028"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1028"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1028"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1028"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1029"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1029"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1029"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1029"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1030"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1034"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1034"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1034"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1034"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_23
#AT_START_24
at_fn_group_banner 24 'firewall-cmd.at:1036' \
  "rich rules audit" "                               " 1
at_xfail=no
(
  $as_echo "24. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1036"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi









































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1040"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1040"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1040"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1040"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_24
#AT_START_25
at_fn_group_banner 25 'firewall-cmd.at:1044' \
  "rich rules priority" "                            " 1
at_xfail=no
(
  $as_echo "25. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1198: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1198"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1199: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1199"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1199"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1200"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1201: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1201"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }



























































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_25
#AT_START_26
at_fn_group_banner 26 'firewall-cmd.at:1659' \
  "rich rules bad" "                                 " 1
at_xfail=no
(
  $as_echo "26. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1659"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1666: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 " "firewall-cmd.at:1666"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1666"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 " "firewall-cmd.at:1667"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 " "firewall-cmd.at:1668"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 " "firewall-cmd.at:1669"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1670: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 " "firewall-cmd.at:1670"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 " "firewall-cmd.at:1671"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1672: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 " "firewall-cmd.at:1672"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 " "firewall-cmd.at:1673"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1674: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 " "firewall-cmd.at:1674"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 " "firewall-cmd.at:1675"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1676: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 " "firewall-cmd.at:1676"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 " "firewall-cmd.at:1677"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 " "firewall-cmd.at:1678"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 " "firewall-cmd.at:1679"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 " "firewall-cmd.at:1680"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1680"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1680"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 " "firewall-cmd.at:1685"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1686: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 " "firewall-cmd.at:1686"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1686"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1687: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 " "firewall-cmd.at:1687"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1687"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 " "firewall-cmd.at:1688"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_26
#AT_START_27
at_fn_group_banner 27 'firewall-cmd.at:1695' \
  "config validation" "                              " 1
at_xfail=no
(
  $as_echo "27. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1695"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1699"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }







        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1704: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1704"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1705: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1705"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1705"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1706: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1706"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "ERROR: Invalid option: 'SomeBogusField=yes'
ERROR: Invalid option: 'SomeBogusField=yes'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1706"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1720: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1720"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1720"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1728: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1728"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1728"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1729: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1729"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1729"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1738"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1746: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1746"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1746"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1754"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1755: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1755"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1755"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1758: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1758"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1758"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1765: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1765"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1765"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1777: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1777"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1777"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1784: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1784"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1784"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1785"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1788"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1794"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1801"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1803"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1812: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1812"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1815: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1815"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1815"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1822"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1830: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1830"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1830"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1831: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1831"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1831"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1834: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1834"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1834"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1841: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1841"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1841"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1849: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1849"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1849"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1857: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1857"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1857"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1865: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1865"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1865"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1873: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1873"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1873"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1881: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1881"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1881"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1890: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1890"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1890"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1898: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1898"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1898"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1899: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1899"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1902: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1902"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1902"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1906: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1906"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1906"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1914: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1914"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1922: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1922"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1922"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1930: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1930"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1930"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1938"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1946"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1962: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1962"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1962"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1970"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1978: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1978"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1978"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1986"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1994: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1994"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid source: No address no ipset.
WARNING: Invalid source: No address no ipset.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1994"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2009"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2022: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2022"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2022"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2037: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2037"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid log level
WARNING: Invalid rule: Invalid log level
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2037"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2052: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2052"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2052"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2054: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2054"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2054"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2070"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_27
#AT_START_28
at_fn_group_banner 28 'firewall-offline-cmd.at:17' \
  "lokkit migration" "                               " 1
at_xfail=no
(
  $as_echo "28. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:17: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-offline-cmd.at:17"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:17: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-offline-cmd.at:17"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:21: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444" "firewall-offline-cmd.at:21"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:29: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:29"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:30: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:30"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:31: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:31"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:40: cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF
    "
at_fn_check_prepare_notrace 'an embedded newline' "firewall-offline-cmd.at:40"
( $at_check_trace; cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }











    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall" "firewall-offline-cmd.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_28
#AT_START_29
at_fn_group_banner 29 'firewalld.conf.at:1' \
  "firewalld.conf" "                                 " 2
at_xfail=no
(
  $as_echo "29. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1663" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: ip netns add fwd-test-1663"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; ip netns add fwd-test-1663
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:\"org.fedoraproject.FirewallD1.config\"               | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer \" : \" $0} } /^dict entry/{line_mark=line}' | sort "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:"org.fedoraproject.FirewallD1.config"               | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer " : " $0} } /^dict entry/{line_mark=line}' | sort
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "string \"AutomaticHelpers\" : variant string \"system\"
string \"CleanupOnExit\" : variant string \"no\"
string \"DefaultZone\" : variant string \"public\"
string \"FirewallBackend\" : variant string \"nftables\"
string \"FlushAllOnReload\" : variant string \"yes\"
string \"IPv6_rpfilter\" : variant string \"no\"
string \"IndividualCalls\" : variant string \"no\"
string \"Lockdown\" : variant string \"no\"
string \"LogDenied\" : variant string \"off\"
string \"MinimalMark\" : variant int32 100
string \"RFC3964_IPv4\" : variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\" int32:1234 "
at_fn_check_prepare_trace "firewalld.conf.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark" int32:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant int32 1234
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"Lockdown" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"Lockdown"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\" string:\"all\" "
at_fn_check_prepare_trace "firewalld.conf.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"LogDenied" string:"all"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"LogDenied"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"all\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\" string:\"iptables\" "
at_fn_check_prepare_trace "firewalld.conf.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend" string:"iptables"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"iptables\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8449\" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8449" ip netns exec fwd-test-1663 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewalld.conf.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:42"
            $as_echo "firewalld.conf.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_29
#AT_START_30
at_fn_group_banner 30 'service.at:1' \
  "dbus api - services" "                            " 2
at_xfail=no
(
  $as_echo "30. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-13208" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service.at:1: ip netns add fwd-test-13208"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; ip netns add fwd-test-13208
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:1"






    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"
    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"

    { set +x
$as_echo "$at_srcdir/service.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
<arg direction=\"out\" type=\"o\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:11" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:11"

    { set +x
$as_echo "$at_srcdir/service.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar service is for foobar\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {\"ipv4\": \"1.2.3.4\"},        [\"icmp\", \"igmp\"],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar"      '("1.0",        "foobar",        "foobar service is for foobar",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {"ipv4": "1.2.3.4"},        ["icmp", "igmp"],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"
    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"

    { set +x
$as_echo "$at_srcdir/service.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:31"

    { set +x
$as_echo "$at_srcdir/service.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar service is for foobar', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], {'ipv4': '1.2.3.4'}, ['icmp', 'igmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"
    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"

    { set +x
$as_echo "$at_srcdir/service.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:40"

    { set +x
$as_echo "$at_srcdir/service.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '(\"1.1\",        \"foobar new\",        \"foobar new service is for foobar\",        [(\"12345\", \"udp\"), (\"2222\", \"tcp\")],        [\"ftp\"],        {},        [\"icmp\"],        [(\"4321\", \"tcp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '("1.1",        "foobar new",        "foobar new service is for foobar",        [("12345", "udp"), ("2222", "tcp")],        ["ftp"],        {},        ["icmp"],        [("4321", "tcp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:52"

    { set +x
$as_echo "$at_srcdir/service.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"
    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"

    { set +x
$as_echo "$at_srcdir/service.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"loadDefaults\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="loadDefaults"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:60" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:60"

    { set +x
$as_echo "$at_srcdir/service.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:63" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:63"

    { set +x
$as_echo "$at_srcdir/service.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion \"1.1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion "1.1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:64" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:64"

    { set +x
$as_echo "$at_srcdir/service.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:65"

    { set +x
$as_echo "$at_srcdir/service.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:68" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:68"

    { set +x
$as_echo "$at_srcdir/service.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"
    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"

    { set +x
$as_echo "$at_srcdir/service.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"remove\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="remove"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"
    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"

    { set +x
$as_echo "$at_srcdir/service.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"rename\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="rename"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"
    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"

    { set +x
$as_echo "$at_srcdir/service.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getVersion\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getVersion"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"
    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"

    { set +x
$as_echo "$at_srcdir/service.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setVersion\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setVersion"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"
    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"

    { set +x
$as_echo "$at_srcdir/service.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getShort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getShort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"
    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"

    { set +x
$as_echo "$at_srcdir/service.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setShort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setShort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"
    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"

    { set +x
$as_echo "$at_srcdir/service.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDescription\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDescription"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"
    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"

    { set +x
$as_echo "$at_srcdir/service.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDescription\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDescription"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"
    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"

    { set +x
$as_echo "$at_srcdir/service.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"
    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"

    { set +x
$as_echo "$at_srcdir/service.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setPorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setPorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"
    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"

    { set +x
$as_echo "$at_srcdir/service.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"
    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"

    { set +x
$as_echo "$at_srcdir/service.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"
    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"

    { set +x
$as_echo "$at_srcdir/service.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"
    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"

    { set +x
$as_echo "$at_srcdir/service.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSourcePorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSourcePorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"
    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"

    { set +x
$as_echo "$at_srcdir/service.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setSourcePorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setSourcePorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"
    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"

    { set +x
$as_echo "$at_srcdir/service.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addSourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addSourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"
    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"

    { set +x
$as_echo "$at_srcdir/service.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeSourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeSourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"
    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"

    { set +x
$as_echo "$at_srcdir/service.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"querySourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="querySourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"
    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"

    { set +x
$as_echo "$at_srcdir/service.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getProtocols\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getProtocols"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"
    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"

    { set +x
$as_echo "$at_srcdir/service.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setProtocols\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setProtocols"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"
    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"

    { set +x
$as_echo "$at_srcdir/service.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"
    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"

    { set +x
$as_echo "$at_srcdir/service.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"
    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"

    { set +x
$as_echo "$at_srcdir/service.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"
    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"

    { set +x
$as_echo "$at_srcdir/service.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getModules\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getModules"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getModules\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"
    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"

    { set +x
$as_echo "$at_srcdir/service.at:207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setModules\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setModules"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setModules\">
<arg direction=\"in\" name=\"modules\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:207"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"
    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"

    { set +x
$as_echo "$at_srcdir/service.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"
    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"

    { set +x
$as_echo "$at_srcdir/service.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"
    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"

    { set +x
$as_echo "$at_srcdir/service.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"
    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"

    { set +x
$as_echo "$at_srcdir/service.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestinations\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestinations"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestinations\">
<arg direction=\"out\" type=\"a{ss}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"
    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"

    { set +x
$as_echo "$at_srcdir/service.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestinations\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestinations"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestinations\">
<arg direction=\"in\" name=\"destinations\" type=\"a{ss}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"
    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"

    { set +x
$as_echo "$at_srcdir/service.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"in\" name=\"address\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"
    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"

    { set +x
$as_echo "$at_srcdir/service.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"
    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"

    { set +x
$as_echo "$at_srcdir/service.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"
    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"

    { set +x
$as_echo "$at_srcdir/service.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"in\" name=\"address\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"
    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"

    { set +x
$as_echo "$at_srcdir/service.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getIncludes\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getIncludes"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIncludes\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:269"

    { set +x
$as_echo "$at_srcdir/service.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(@as [],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"
    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"

    { set +x
$as_echo "$at_srcdir/service.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setIncludes\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setIncludes"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIncludes\">
<arg direction=\"in\" name=\"includes\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:277"

    { set +x
$as_echo "$at_srcdir/service.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '[\"https\", \"ssh\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '["https", "ssh"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:278" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:278"

    { set +x
$as_echo "$at_srcdir/service.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https', 'ssh'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"
    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"

    { set +x
$as_echo "$at_srcdir/service.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:286"

    { set +x
$as_echo "$at_srcdir/service.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:287" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:287"

    { set +x
$as_echo "$at_srcdir/service.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"
    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"

    { set +x
$as_echo "$at_srcdir/service.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:295" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:295"

    { set +x
$as_echo "$at_srcdir/service.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"
    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"

    { set +x
$as_echo "$at_srcdir/service.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:302" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:302"

    { set +x
$as_echo "$at_srcdir/service.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"
    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"

    { set +x
$as_echo "$at_srcdir/service.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:313" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:313"

    { set +x
$as_echo "$at_srcdir/service.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "service.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:324"

    { set +x
$as_echo "$at_srcdir/service.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar-old\"      '(\"1.0\",        \"foobar-old\",        \"foobar-old service is for foobar-old\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {},        [],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar-old"      '("1.0",        "foobar-old",        "foobar-old service is for foobar-old",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {},        [],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ

    $as_echo "service.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:338"

    { set +x
$as_echo "$at_srcdir/service.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\"]>,
       \"protocols\": <[\"icmp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https"]>,
       "protocols": <["icmp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:345" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:345"

    { set +x
$as_echo "$at_srcdir/service.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:348"

    { set +x
$as_echo "$at_srcdir/service.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:360"

    { set +x
$as_echo "$at_srcdir/service.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:363" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:363"

    { set +x
$as_echo "$at_srcdir/service.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"
    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"

    { set +x
$as_echo "$at_srcdir/service.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService2\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"/>
<arg direction=\"out\" type=\"o\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:382" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:382"

    { set +x
$as_echo "$at_srcdir/service.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 \"foobar-dict\"      '{\"version\": <\"1.0\">,
       \"short\": <\"foobar-dict\">,
       \"description\": <\"foobar-dict service is for foobar-dict\">,
       \"ports\": <[(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")]>,
       \"modules\": <[\"ftp\"]>,
       \"destination\": <{\"ipv6\": \"1234::4321\"}>,
       \"protocols\": <[\"icmp\", \"igmp\"]>,
       \"source_ports\": <[(\"4321\", \"tcp\"), (\"4321\", \"udp\")]>,
       \"includes\": <[\"https\", \"samba\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 "foobar-dict"      '{"version": <"1.0">,
       "short": <"foobar-dict">,
       "description": <"foobar-dict service is for foobar-dict">,
       "ports": <[("1234", "udp"), ("22", "tcp"), ("1234", "udp")]>,
       "modules": <["ftp"]>,
       "destination": <{"ipv6": "1234::4321"}>,
       "protocols": <["icmp", "igmp"]>,
       "source_ports": <[("4321", "tcp"), ("4321", "udp")]>,
       "includes": <["https", "samba"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:398" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:398"
    $as_echo "service.at:398" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:398"

    { set +x
$as_echo "$at_srcdir/service.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:403" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:403"

    { set +x
$as_echo "$at_srcdir/service.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'includes': <['https', 'samba']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:416" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:416"
    $as_echo "service.at:416" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:416"

    { set +x
$as_echo "$at_srcdir/service.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:421" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:421"

    { set +x
$as_echo "$at_srcdir/service.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\", \"samba\", \"http\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https", "samba", "http"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:426" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:426"

    { set +x
$as_echo "$at_srcdir/service.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'includes': <['https', 'samba', 'http']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:439" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:439"

    { set +x
$as_echo "$at_srcdir/service.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.2\">,
       \"includes\": <@as []>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.2">,
       "includes": <@as []>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:444"

    { set +x
$as_echo "$at_srcdir/service.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:456" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:456"
    $as_echo "service.at:456" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:456"

    { set +x
$as_echo "$at_srcdir/service.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings2\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"out\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:462"

    { set +x
$as_echo "$at_srcdir/service.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-dict\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-dict"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:474"

    { set +x
$as_echo "$at_srcdir/service.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27975\" ip netns exec fwd-test-13208     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.3\">,
       \"thisdoesnotexist\": <\"\">
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27975" ip netns exec fwd-test-13208     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.3">,
       "thisdoesnotexist": <"">
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_OPTION: service option/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_OPTION: service option/d'"; then
                sed -i -e '/ERROR: INVALID_OPTION: service option/d' ./firewalld.log
            fi
            $as_echo "service.at:480" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:480"
            $as_echo "service.at:480" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:480"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_30
#AT_START_31
at_fn_group_banner 31 'firewall-cmd.at:5' \
  "basic options" "                                  " 3
at_xfail=no
(
  $as_echo "31. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24221" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-24221"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-24221
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd -h "
at_fn_check_prepare_trace "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --help "
at_fn_check_prepare_trace "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd -V "
at_fn_check_prepare_trace "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_trace "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --panic-on "
at_fn_check_prepare_trace "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --panic-off "
at_fn_check_prepare_trace "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7770\" ip netns exec fwd-test-24221 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7770" ip netns exec fwd-test-24221 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_31
#AT_START_32
at_fn_group_banner 32 'firewall-cmd.at:28' \
  "get/list options" "                               " 3
at_xfail=no
(
  $as_echo "32. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26775" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-26775"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-26775
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22281\" ip netns exec fwd-test-26775 firewall-cmd --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22281" ip netns exec fwd-test-26775 firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_32
#AT_START_33
at_fn_group_banner 33 'firewall-cmd.at:44' \
  "default zone" "                                   " 3
at_xfail=no
(
  $as_echo "33. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24476" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-24476"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-24476
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31261\" ip netns exec fwd-test-24476 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31261\" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_trace "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31261\" ip netns exec fwd-test-24476 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31261\" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_trace "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31261\" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31261" ip netns exec fwd-test-24476 firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_33
#AT_START_34
at_fn_group_banner 34 'firewall-cmd.at:56' \
  "user zone" "                                      " 3
at_xfail=no
(
  $as_echo "34. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31878" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-31878"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-31878
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_trace "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_trace "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_trace "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25517\" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25517" ip netns exec fwd-test-31878 firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TARGET: BAD/d'"; then
                sed -i -e '/ERROR: INVALID_TARGET: BAD/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_34
#AT_START_35
at_fn_group_banner 35 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 3
at_xfail=no
(
  $as_echo "35. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18355" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: ip netns add fwd-test-18355"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; ip netns add fwd-test-18355
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-active-zones "
at_fn_check_prepare_trace "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --set-default-zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=bar "
at_fn_check_prepare_trace "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
iifname \"foobar*\" goto filter_IN_public
iifname \"foobar++*\" goto filter_IN_public
goto filter_IN_trusted
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7600\" ip netns exec fwd-test-18355 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7600" ip netns exec fwd-test-18355 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'"; then
                sed -i -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_35
#AT_START_36
at_fn_group_banner 36 'firewall-cmd.at:169' \
  "zone sources" "                                   " 3
at_xfail=no
(
  $as_echo "36. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30588" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: ip netns add fwd-test-30588"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; ip netns add fwd-test-30588
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23753\" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23753" ip netns exec fwd-test-30588 firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            if test -n " -e '/ERROR: ZONE_CONFLICT/d'"; then
                sed -i  -e '/ERROR: ZONE_CONFLICT/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_36
#AT_START_37
at_fn_group_banner 37 'firewall-cmd.at:221' \
  "services" "                                       " 3
at_xfail=no
(
  $as_echo "37. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-863" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: ip netns add fwd-test-863"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; ip netns add fwd-test-863
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_trace "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_trace "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_trace "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_trace "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2094\" ip netns exec fwd-test-863 firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2094" ip netns exec fwd-test-863 firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE:/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_37
#AT_START_38
at_fn_group_banner 38 'firewall-cmd.at:265' \
  "user services" "                                  " 3
at_xfail=no
(
  $as_echo "38. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6234" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: ip netns add fwd-test-6234"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; ip netns add fwd-test-6234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_trace "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_trace "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_trace "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5489\" ip netns exec fwd-test-6234 firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5489" ip netns exec fwd-test-6234 firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF








        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'"; then
                sed -i -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_38
#AT_START_39
at_fn_group_banner 39 'firewall-cmd.at:337' \
  "ports" "                                          " 3
at_xfail=no
(
  $as_echo "39. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7955" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: ip netns add fwd-test-7955"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; ip netns add fwd-test-7955
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --zone home --list-ports "
at_fn_check_prepare_trace "firewall-cmd.at:340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_trace "firewall-cmd.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_trace "firewall-cmd.at:344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23003\" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23003" ip netns exec fwd-test-7955 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_39
#AT_START_40
at_fn_group_banner 40 'firewall-cmd.at:394' \
  "source ports" "                                   " 3
at_xfail=no
(
  $as_echo "40. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17748" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: ip netns add fwd-test-17748"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; ip netns add fwd-test-17748
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_trace "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13225\" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13225" ip netns exec fwd-test-17748 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_40
#AT_START_41
at_fn_group_banner 41 'firewall-cmd.at:431' \
  "protocols" "                                      " 3
at_xfail=no
(
  $as_echo "41. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3035" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: ip netns add fwd-test-3035"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; ip netns add fwd-test-3035
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29278\" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29278" ip netns exec fwd-test-3035 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_PROTOCOL: dummy/d'"; then
                sed -i -e '/ERROR: INVALID_PROTOCOL: dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_41
#AT_START_42
at_fn_group_banner 42 'firewall-cmd.at:459' \
  "masquerade" "                                     " 3
at_xfail=no
(
  $as_echo "42. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28889" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: ip netns add fwd-test-28889"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; ip netns add fwd-test-28889
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POST_public_allow {
oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POST_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11395\" ip netns exec fwd-test-28889 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11395" ip netns exec fwd-test-28889 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:490" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:490"
            $as_echo "firewall-cmd.at:490" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:490"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_42
#AT_START_43
at_fn_group_banner 43 'firewall-cmd.at:492' \
  "forward ports" "                                  " 3
at_xfail=no
(
  $as_echo "43. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-15262" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: ip netns add fwd-test-15262"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; ip netns add fwd-test-15262
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_allow {
tcp dport 11 redirect to :22
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_allow {
tcp dport 33 dnat to 4.4.4.4
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_allow {
sctp dport 66 dnat to [fd00:dead:beef:ff0::]:66
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:580:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:580"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:580"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:586:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:586"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:586"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7074\" ip netns exec fwd-test-15262 firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7074" ip netns exec fwd-test-15262 firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:607" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:607"
            $as_echo "firewall-cmd.at:607" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:607"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_43
#AT_START_44
at_fn_group_banner 44 'firewall-cmd.at:609' \
  "ICMP block" "                                     " 3
at_xfail=no
(
  $as_echo "44. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:609"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31467" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: ip netns add fwd-test-31467"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; ip netns add fwd-test-31467
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_trace "firewall-cmd.at:612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:612"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:615:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:615"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:615"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:616:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:616"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:616"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:617:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:617"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:617"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:618:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:618"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:618"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:625:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:625"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:625"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:627:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:627"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:627"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:628:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:628"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:628"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:629:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:629"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:629"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:630"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:631"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:634"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:636:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:636"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:636"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:637:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:637"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:637"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:639:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:639"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:639"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:644:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:644"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:644"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:646:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:646"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:646"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:647:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:647"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:647"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:648:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:648"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:648"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:649:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:649"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:649"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:650:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:650"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:650"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:651"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:652:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14790\" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:652"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14790" ip netns exec fwd-test-31467 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:652"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ICMPTYPE:/d'"; then
                sed -i -e '/ERROR: INVALID_ICMPTYPE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_44
#AT_START_45
at_fn_group_banner 45 'firewall-cmd.at:655' \
  "user ICMP types" "                                " 3
at_xfail=no
(
  $as_echo "45. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30780" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: ip netns add fwd-test-30780"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; ip netns add fwd-test-30780
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:658"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:663"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:665"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:666"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:671"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13567\" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13567" ip netns exec fwd-test-30780 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            if test -n "-e '/NAME_CONFLICT: new_icmptype():/d'"; then
                sed -i -e '/NAME_CONFLICT: new_icmptype():/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:676" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:676"
            $as_echo "firewall-cmd.at:676" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:676"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_45
#AT_START_46
at_fn_group_banner 46 'firewall-cmd.at:678' \
  "ipset" "                                          " 3
at_xfail=no
(
  $as_echo "46. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:678"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16811" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: ip netns add fwd-test-16811"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; ip netns add fwd-test-16811
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 nft add table inet firewalld_check_ipset "
at_fn_check_prepare_trace "firewall-cmd.at:681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:681"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_trace "firewall-cmd.at:681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:681"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:681"
                $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:681"
                $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:681"
        $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:681"


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_trace "firewall-cmd.at:681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:681"
$at_failed && at_fn_log_failure
$at_traceon; }






        $as_echo "firewall-cmd.at:682" >"$at_check_line_file"
(! ipset --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:682"
        $as_echo "firewall-cmd.at:682" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 ipset create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:682"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 ipset destroy foobar "
at_fn_check_prepare_trace "firewall-cmd.at:682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 ipset destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:682"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:684:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_trace "firewall-cmd.at:684"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:684"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_trace "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:700"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:703"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_trace "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_trace "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:710"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:715:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_trace "firewall-cmd.at:715"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:715"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_trace "firewall-cmd.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1008\" ip netns exec fwd-test-16811 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1008" ip netns exec fwd-test-16811 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }













        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ENTRY: invalid address/d'"; then
                sed -i -e '/ERROR: INVALID_ENTRY: invalid address/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:729" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:729"
            $as_echo "firewall-cmd.at:729" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:729"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_46
#AT_START_47
at_fn_group_banner 47 'firewall-cmd.at:731' \
  "user helpers" "                                   " 3
at_xfail=no
(
  $as_echo "47. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:731"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5273" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: ip netns add fwd-test-5273"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; ip netns add fwd-test-5273
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_trace "firewall-cmd.at:734"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_trace "firewall-cmd.at:735"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:739"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_trace "firewall-cmd.at:741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:743:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_trace "firewall-cmd.at:743"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:743"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:745"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:755:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:755"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21167\" ip netns exec fwd-test-5273 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21167" ip netns exec fwd-test-5273 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_MODULE:/d'"; then
                sed -i -e '/ERROR: INVALID_MODULE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:757" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:757"
            $as_echo "firewall-cmd.at:757" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:757"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_47
#AT_START_48
at_fn_group_banner 48 'firewall-cmd.at:759' \
  "direct" "                                         " 3
at_xfail=no
(
  $as_echo "48. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32173" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: ip netns add fwd-test-32173"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; ip netns add fwd-test-32173
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:774"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:775"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:776:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:776"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:776"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:778:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:778"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:778"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:783"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:786"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:787:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:787"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:787"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_trace "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --reload "
at_fn_check_prepare_trace "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-32173 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-32173 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'"; then
                sed -i -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_48
#AT_START_49
at_fn_group_banner 49 'firewall-cmd.at:832' \
  "direct nat" "                                     " 3
at_xfail=no
(
  $as_echo "49. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:832"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25385" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: ip netns add fwd-test-25385"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; ip netns add fwd-test-25385
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-845" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"







        KERNEL_MAJOR=`uname -r | cut -d. -f1`
        KERNEL_MINOR=`uname -r | cut -d. -f2`
        if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 16 || test ${KERNEL_MAJOR} -gt 4; then
                                    $as_echo "firewall-cmd.at:835" >"$at_check_line_file"
(! modprobe iptable_nat) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:835"
            $as_echo "firewall-cmd.at:835" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 nft add table ip foobar ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:835"
            $as_echo "firewall-cmd.at:835" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 nft add chain ip foobar foobar_chain { type nat hook postrouting priority 100 \; } ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:835"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:835:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 nft delete table ip foobar "
at_fn_check_prepare_trace "firewall-cmd.at:835"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 nft delete table ip foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:835"
$at_failed && at_fn_log_failure
$at_traceon; }


        else
            $as_echo "firewall-cmd.at:835" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:835"
        fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:841"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:849:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:849"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:849"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-845\" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-845" ip netns exec fwd-test-25385 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
            $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_49
#AT_START_50
at_fn_group_banner 50 'firewall-cmd.at:856' \
  "direct passthrough" "                             " 3
at_xfail=no
(
  $as_echo "50. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:856"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3640" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: ip netns add fwd-test-3640"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; ip netns add fwd-test-3640
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:859: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:859"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:859"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:861"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:862:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:862"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:862"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:866:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:866"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:866"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:880:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:880"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:880"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_trace "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:890"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:892:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25963\" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:892"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25963" ip netns exec fwd-test-3640 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:892"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            if test -n "-e '/WARNING: NOT_ENABLED: passthrough/d'"; then
                sed -i -e '/WARNING: NOT_ENABLED: passthrough/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:893" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:893"
            $as_echo "firewall-cmd.at:893" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:893"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_50
#AT_START_51
at_fn_group_banner 51 'firewall-cmd.at:895' \
  "direct ebtables" "                                " 3
at_xfail=no
(
  $as_echo "51. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:895"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28376" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: ip netns add fwd-test-28376"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; ip netns add fwd-test-28376
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:913"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:915"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:927:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_trace "firewall-cmd.at:927"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:927"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:928:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:928"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:928"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:930"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:931"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:932:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:932"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:932"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:933"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:933"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17198\" ip netns exec fwd-test-28376     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17198" ip netns exec fwd-test-28376     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:938" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:938"
            $as_echo "firewall-cmd.at:938" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:938"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_51
#AT_START_52
at_fn_group_banner 52 'firewall-cmd.at:940' \
  "lockdown" "                                       " 3
at_xfail=no
(
  $as_echo "52. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6486" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: ip netns add fwd-test-6486"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; ip netns add fwd-test-6486
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:943:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:943"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:943"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:944:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:944"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:962:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:962"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:962"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:965"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:970"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:972"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:973:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:973"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:973"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:976"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:978"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:981"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:982:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:982"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:982"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:984"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:989" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:989"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_trace "firewall-cmd.at:990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:990"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --lockdown-on "
at_fn_check_prepare_trace "firewall-cmd.at:991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:992:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:992"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:992"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --lockdown-off "
at_fn_check_prepare_trace "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6955\" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6955" ip netns exec fwd-test-6486 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:994"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:995" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:995"
            $as_echo "firewall-cmd.at:995" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:995"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_52
#AT_START_53
at_fn_group_banner 53 'firewall-cmd.at:1007' \
  "rich rules good" "                                " 3
at_xfail=no
(
  $as_echo "53. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1007"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14649" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: ip netns add fwd-test-14649"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; ip netns add fwd-test-14649
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8715\" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8715" ip netns exec fwd-test-14649 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1035" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1035"
            $as_echo "firewall-cmd.at:1035" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1035"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_53
#AT_START_54
at_fn_group_banner 54 'firewall-cmd.at:1036' \
  "rich rules audit" "                               " 3
at_xfail=no
(
  $as_echo "54. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1036"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23485" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: ip netns add fwd-test-23485"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; ip netns add fwd-test-23485
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1039:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:1039"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1039"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1039:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_trace "firewall-cmd.at:1039"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1039"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1039" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1039"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1039:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:1039"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1039"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9262\" ip netns exec fwd-test-23485 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9262" ip netns exec fwd-test-23485 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1041" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1041"
            $as_echo "firewall-cmd.at:1041" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1041"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_54
#AT_START_55
at_fn_group_banner 55 'firewall-cmd.at:1044' \
  "rich rules priority" "                            " 3
at_xfail=no
(
  $as_echo "55. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24908" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: ip netns add fwd-test-24908"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; ip netns add fwd-test-24908
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1047:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:1047"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1047"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1047:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_trace "firewall-cmd.at:1047"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1047"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1047" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1047"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1047:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:1047"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1047"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1050:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1050"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public {
jump filter_IN_public_pre
jump filter_IN_public_log
jump filter_IN_public_deny
jump filter_IN_public_allow
jump filter_IN_public_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1050"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public {
jump filter_FWDI_public_pre
jump filter_FWDI_public_log
jump filter_FWDI_public_deny
jump filter_FWDI_public_allow
jump filter_FWDI_public_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1062"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
tcp dport 1111 ct state new,untracked log
tcp dport 1122 ct state new,untracked log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1117"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
tcp dport 2222 ct state new,untracked drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 1122 ct state new,untracked accept
tcp dport 3333 ct state new,untracked accept
tcp dport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1182"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1197"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1206"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1217"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.1.0.0/16 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1235"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1242"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1250"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1256"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDO_public_pre {
ip saddr 10.1.1.0/24 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1262"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDO_public_allow {
ip saddr 10.10.0.0/16 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1269"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_pre {
tcp dport 8888 redirect to :80
tcp dport 8080 dnat to 10.1.1.1:80
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1276"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_allow {
tcp dport 222 redirect to :22
tcp dport 2222 dnat to 10.1.1.1:22
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POST_public_pre {
ip saddr 10.1.1.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1292"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POST_public_allow {
ip saddr 10.10.0.0/16 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_pre {
tcp dport 999 redirect to :99
tcp dport 9999 dnat to [1234::4321]:9999
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_allow {
tcp dport 9090 redirect to :90
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1314"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POST_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1321"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POST_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1327"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1333"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1400"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1406"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1407"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1408"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1418"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1426"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_pre {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1436"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_deny {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1446"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_allow {
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1454"
$at_failed && at_fn_log_failure
$at_traceon; }














































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1520"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1522"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1523"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1530"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1531:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1531"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1531"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1532:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1532"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.0.0.0/8 log
tcp dport 1111 ct state new,untracked log
tcp dport 1111 ct state new,untracked drop
ip saddr 10.10.10.0/24 accept
ip saddr 10.0.0.0/8 log
ip saddr 10.0.0.0/8 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1532"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1552"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1564:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1564"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
tcp dport 80 ct state new,untracked accept
tcp dport 22 ct state new,untracked accept
tcp dport 443 ct state new,untracked accept
tcp dport 143 ct state new,untracked accept
log prefix \"DROPPED: \"
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1564"
$at_failed && at_fn_log_failure
$at_traceon; }







































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "firewall-cmd.at:1619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1619"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1620"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1624"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1625:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12490\" ip netns exec fwd-test-24908 firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1625"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12490" ip netns exec fwd-test-24908 firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1625"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1654" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1654"
            $as_echo "firewall-cmd.at:1654" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1654"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_55
#AT_START_56
at_fn_group_banner 56 'firewall-cmd.at:1659' \
  "rich rules bad" "                                 " 3
at_xfail=no
(
  $as_echo "56. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1659"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20294" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: ip netns add fwd-test-20294"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; ip netns add fwd-test-20294
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1666"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1666"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1680"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1686"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1687"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1687"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8835\" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8835" ip netns exec fwd-test-20294 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'"; then
                sed -i -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1690" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1690"
            $as_echo "firewall-cmd.at:1690" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1690"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_56
#AT_START_57
at_fn_group_banner 57 'firewall-cmd.at:1695' \
  "config validation" "                              " 3
at_xfail=no
(
  $as_echo "57. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1695"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24657" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: ip netns add fwd-test-24657"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; ip netns add fwd-test-24657
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1704: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1704"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1705: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1705"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1705"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1706"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1720"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1728"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1729: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1729"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1729"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1746:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1746"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1746"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1755: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1755"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1755"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1758: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1758"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1758"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1765"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1777:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1777"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1777"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1784"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1785"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1788"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1812: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1812"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1815: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1815"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1815"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1830"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1831: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1831"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1831"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1834: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1834"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1834"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1841"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1849:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1849"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1849"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1857"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1865"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1873"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1881"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1890"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1898"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1899: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1899"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1902: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1902"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1902"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1906"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1922:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1922"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1922"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1930"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1962:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1962"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1962"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1978"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1994"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2022:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2022"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2022"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2037:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2037"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2037"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2052:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2052"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2052"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2054:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29724\" ip netns exec fwd-test-24657 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2054"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29724" ip netns exec fwd-test-24657 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2054"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2070"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            if test -n "-e '/ERROR:/d'              -e '/WARNING:/d'"; then
                sed -i -e '/ERROR:/d'              -e '/WARNING:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:2072" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2072"
            $as_echo "firewall-cmd.at:2072" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2072"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_57
#AT_START_58
at_fn_group_banner 58 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 4
at_xfail=no
(
  $as_echo "58. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1625" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-1625"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-1625
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625 firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_trace "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9734\" ip netns exec fwd-test-1625     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9734" ip netns exec fwd-test-1625     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }


























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_58
#AT_START_59
at_fn_group_banner 59 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 4
at_xfail=no
(
  $as_echo "59. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-8238" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-8238"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-8238
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:5: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:5"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:17: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:17"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd --state "
at_fn_check_prepare_trace "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26102\" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26102" ip netns exec fwd-test-8238 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            if test -n "-e '/.*a-bogus-flag.*/d'"; then
                sed -i -e '/.*a-bogus-flag.*/d' ./firewalld.log
            fi
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_59
#AT_START_60
at_fn_group_banner 60 'pr181.at:1' \
  "combined zones name length check" "               " 4
at_xfail=no
(
  $as_echo "60. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27892" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-27892"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-27892
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21283\" ip netns exec fwd-test-27892 firewall-cmd -q --reload "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21283\" ip netns exec fwd-test-27892 firewall-cmd -q --state "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21283\" ip netns exec fwd-test-27892 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21283" ip netns exec fwd-test-27892 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_60
#AT_START_61
at_fn_group_banner 61 'gh287.at:1' \
  "ICMP block inversion" "                           " 4
at_xfail=no
(
  $as_echo "61. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32367" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-32367"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-32367
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" ip netns exec fwd-test-32367 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" ip netns exec fwd-test-32367 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" ip netns exec fwd-test-32367 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30382\" ip netns exec fwd-test-32367 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" ip netns exec fwd-test-32367 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30382\" ip netns exec fwd-test-32367 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30382" ip netns exec fwd-test-32367 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_61
#AT_START_62
at_fn_group_banner 62 'individual_calls.at:1' \
  "individual calls" "                               " 4
at_xfail=no
(
  $as_echo "62. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18768" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-18768"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-18768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" ip netns exec fwd-test-18768 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" ip netns exec fwd-test-18768 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" ip netns exec fwd-test-18768 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12018\" ip netns exec fwd-test-18768 firewall-cmd -q --reload "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" ip netns exec fwd-test-18768 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12018\" ip netns exec fwd-test-18768 firewall-cmd -q --state "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12018" ip netns exec fwd-test-18768 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_62
#AT_START_63
at_fn_group_banner 63 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 4
at_xfail=no
(
  $as_echo "63. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16154" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-16154"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-16154
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31708\" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31708" ip netns exec fwd-test-16154 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_63
#AT_START_64
at_fn_group_banner 64 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 4
at_xfail=no
(
  $as_echo "64. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25521" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-25521"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-25521
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" ip netns exec fwd-test-25521 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" ip netns exec fwd-test-25521 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" ip netns exec fwd-test-25521 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"





{ set +x
$as_echo "$at_srcdir/gh290.at:5: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:5"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:11: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:11"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/gh290.at:14: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:14"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:15: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:16: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:16"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:17: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:17"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:19: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:20: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:20"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:21: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:21"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" ip netns exec fwd-test-25521 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:23" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:23"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26694" ip netns exec fwd-test-25521 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:23" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:23"



    { set +x
$as_echo "$at_srcdir/gh290.at:24: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:25: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'"; then
                sed -i -e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d' ./firewalld.log
            fi
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_64
#AT_START_65
at_fn_group_banner 65 'icmp_block_in_forward_chain.at:1' \
  "ICMP block present FORWARD chain" "               " 4
at_xfail=no
(
  $as_echo "65. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9692" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-9692"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-9692
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7707\" ip netns exec fwd-test-9692 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7707\" ip netns exec fwd-test-9692     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable icmp code host-prohibited reject with icmp type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7707\" ip netns exec fwd-test-9692     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7707" ip netns exec fwd-test-9692     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_deny {
icmp type destination-unreachable icmp code host-prohibited reject with icmp type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_65
#AT_START_66
at_fn_group_banner 66 'pr323.at:1' \
  "GRE proto helper" "                               " 4
at_xfail=no
(
  $as_echo "66. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31753" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-31753"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-31753
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17924\" ip netns exec fwd-test-31753 firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_trace "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17924\" ip netns exec fwd-test-31753 firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_trace "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17924\" ip netns exec fwd-test-31753 firewall-cmd -q --add-service=gre "
at_fn_check_prepare_trace "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17924" ip netns exec fwd-test-31753 firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_66
#AT_START_67
at_fn_group_banner 67 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 4
at_xfail=no
(
  $as_echo "67. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23829" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-23829"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-23829
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 nft add table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_trace "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10113\" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10113" ip netns exec fwd-test-23829 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            if test -n "-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'"; then
                sed -i -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d' ./firewalld.log
            fi
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_67
#AT_START_68
at_fn_group_banner 68 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 4
at_xfail=no
(
  $as_echo "68. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1012" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-1012"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-1012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29822\" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29822\" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29822\" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_trace "rhbz1594657.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29822\" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29822\" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29822" ip netns exec fwd-test-1012 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_68
#AT_START_69
at_fn_group_banner 69 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 4
at_xfail=no
(
  $as_echo "69. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9934" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-9934"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-9934
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_trace "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_trace "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16464\" ip netns exec fwd-test-9934 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16464" ip netns exec fwd-test-9934 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_69
#AT_START_70
at_fn_group_banner 70 'rhbz1404076.at:1' \
  "query single port added with range" "             " 4
at_xfail=no
(
  $as_echo "70. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22017" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-22017"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-22017
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3451\" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3451" ip netns exec fwd-test-22017 firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_70
#AT_START_71
at_fn_group_banner 71 'gh366.at:1' \
  "service destination multiple IP versions" "       " 4
at_xfail=no
(
  $as_echo "71. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23056" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-23056"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-23056
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_trace "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_trace "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_trace "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3869\" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3869" ip netns exec fwd-test-23056 firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_71
#AT_START_72
at_fn_group_banner 72 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 4
at_xfail=no
(
  $as_echo "72. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24514" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-24514"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-24514
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 nft add table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_trace "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_trace "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.1.0.0/22, 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:83: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:83"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21034\" ip netns exec fwd-test-24514     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21034" ip netns exec fwd-test-24514     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'" != x"ignore"; then
            if test -n "-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'"; then
                sed -i -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d' ./firewalld.log
            fi
            $as_echo "rhbz1601610.at:102" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:102"
            $as_echo "rhbz1601610.at:102" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_72
#AT_START_73
at_fn_group_banner 73 'gh303.at:1' \
  "unicode in XML" "                                 " 4
at_xfail=no
(
  $as_echo "73. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28504" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-28504"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-28504
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9770\" ip netns exec fwd-test-28504 firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_trace "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9770\" ip netns exec fwd-test-28504 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9770\" ip netns exec fwd-test-28504 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9770" ip netns exec fwd-test-28504 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_73
#AT_START_74
at_fn_group_banner 74 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 4
at_xfail=no
(
  $as_echo "74. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18206" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-18206"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-18206
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_trace "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_trace "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_trace "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_trace "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_trace "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16383\" ip netns exec fwd-test-18206 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16383" ip netns exec fwd-test-18206 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "gh335.at:68" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
            $as_echo "gh335.at:68" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_74
#AT_START_75
at_fn_group_banner 75 'gh482.at:1' \
  "remove forward-port after reload" "               " 4
at_xfail=no
(
  $as_echo "75. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17792" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-17792"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-17792
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23760\" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23760" ip netns exec fwd-test-17792 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_75
#AT_START_76
at_fn_group_banner 76 'gh478.at:1' \
  "rich rule marks every packet" "                   " 4
at_xfail=no
(
  $as_echo "76. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6190" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-6190"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-6190
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30037\" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_trace "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30037\" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_trace "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30037\" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_trace "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh478.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30037\" ip netns exec fwd-test-6190     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30037" ip netns exec fwd-test-6190     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
tcp dport 1234 mark set 0x0000000a
meta l4proto icmp mark set 0x0000000b
tcp sport 4321 mark set 0x0000000c
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



















        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_76
#AT_START_77
at_fn_group_banner 77 'gh453.at:1' \
  "nftables helper objects" "                        " 4
at_xfail=no
(
  $as_echo "77. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23349" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh453.at:1: ip netns add fwd-test-23349"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; ip netns add fwd-test-23349
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh453.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 nft add table inet firewalld_check_ct_helper "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft add table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh453.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft add ct helper inet firewalld helper-ftp-tcp { type \"ftp\" protocol tcp \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh453.at:1"

    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 nft delete table inet firewalld_check_ct_helper "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft delete table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 firewall-cmd -q --set-automatic-helpers=no "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 firewall-cmd -q --set-automatic-helpers=no
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 firewall-cmd -q --add-service=ftp "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 firewall-cmd -q --add-service=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-ftp-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-ftp-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-ftp-tcp {
type \"ftp\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 firewall-cmd -q --add-service=sip "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 firewall-cmd -q --add-service=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-tcp {
type \"sip\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-udp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-udp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-udp {
type \"sip\" protocol udp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15668\" ip netns exec fwd-test-23349     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15668" ip netns exec fwd-test-23349     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
tcp dport 5060 ct helper set \"helper-sip-tcp\"
udp dport 5060 ct helper set \"helper-sip-udp\"
tcp dport 5060 ct state new,untracked accept
udp dport 5060 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }













        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh453.at:1" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
            $as_echo "gh453.at:1" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_77
#AT_START_78
at_fn_group_banner 78 'gh258.at:1' \
  "zone dispatch layout" "                           " 4
at_xfail=no
(
  $as_echo "78. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10956" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-10956"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-10956
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956 firewall-cmd --zone=work --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_trace "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewall-cmd --zone=work --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956 firewall-cmd --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_trace "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewall-cmd --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956 firewall-cmd --zone=work --add-interface=dummy0 "
at_fn_check_prepare_trace "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewall-cmd --zone=work --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956 firewall-cmd --zone=public --add-interface=dummy1 "
at_fn_check_prepare_trace "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956 firewall-cmd --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip6 saddr dead:beef::/54 goto filter_IN_public
ip saddr 1.2.3.0/24 goto filter_IN_work
iifname \"dummy1\" goto filter_IN_public
iifname \"dummy0\" goto filter_IN_work
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_IN_ZONES {
ip6 saddr dead:beef::/54 goto filter_FWDI_public
ip saddr 1.2.3.0/24 goto filter_FWDI_work
iifname \"dummy1\" goto filter_FWDI_public
iifname \"dummy0\" goto filter_FWDI_work
goto filter_FWDI_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_OUT_ZONES {
ip6 daddr dead:beef::/54 goto filter_FWDO_public
ip daddr 1.2.3.0/24 goto filter_FWDO_work
oifname \"dummy1\" goto filter_FWDO_public
oifname \"dummy0\" goto filter_FWDO_work
goto filter_FWDO_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain raw_PREROUTING {
jump raw_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain raw_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto raw_PRE_public
ip saddr 1.2.3.0/24 goto raw_PRE_work
iifname \"dummy1\" goto raw_PRE_public
iifname \"dummy0\" goto raw_PRE_work
goto raw_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING {
jump mangle_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto mangle_PRE_public
ip saddr 1.2.3.0/24 goto mangle_PRE_work
iifname \"dummy1\" goto mangle_PRE_public
iifname \"dummy0\" goto mangle_PRE_work
goto mangle_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PREROUTING_ZONES {
ip saddr 1.2.3.0/24 goto nat_PRE_work
iifname \"dummy1\" goto nat_PRE_public
iifname \"dummy0\" goto nat_PRE_work
goto nat_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING_ZONES {
ip daddr 1.2.3.0/24 goto nat_POST_work
oifname \"dummy1\" goto nat_POST_public
oifname \"dummy0\" goto nat_POST_work
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto nat_PRE_public
iifname \"dummy1\" goto nat_PRE_public
iifname \"dummy0\" goto nat_PRE_work
goto nat_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19123\" ip netns exec fwd-test-10956     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19123" ip netns exec fwd-test-10956     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POSTROUTING_ZONES {
ip6 daddr dead:beef::/54 goto nat_POST_public
oifname \"dummy1\" goto nat_POST_public
oifname \"dummy0\" goto nat_POST_work
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh258.at:336" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:336"
            $as_echo "gh258.at:336" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:336"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_78
#AT_START_79
at_fn_group_banner 79 'rhbz1715977.at:1' \
  "rich rule destination with service destination" " " 4
at_xfail=no
(
  $as_echo "79. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20508" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-20508"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-20508
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3295\" ip netns exec fwd-test-20508 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3295" ip netns exec fwd-test-20508 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_79
#AT_START_80
at_fn_group_banner 80 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 4
at_xfail=no
(
  $as_echo "80. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9074" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-9074"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-9074
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_trace "rhbz1723610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_trace "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_trace "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2859\" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2859" ip netns exec fwd-test-9074 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1723610.at:31" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:31"
            $as_echo "rhbz1723610.at:31" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:31"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_80
#AT_START_81
at_fn_group_banner 81 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 4
at_xfail=no
(
  $as_echo "81. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12013" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-12013"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-12013
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_trace "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_trace "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_trace "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_trace "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_trace "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_trace "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_trace "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_trace "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_trace "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_trace "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_trace "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_trace "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_trace "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_trace "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_trace "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_trace "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_trace "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_trace "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_trace "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_trace "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"1234:5678::1:1:0/112\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_01 --add-source="1234:5678::1:1:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"1234:5678::1:0:0/96\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_02 --add-source="1234:5678::1:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"1234:5678::2:0:0/96\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_04 --add-source="1234:5678::2:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"1234:5678::2:2:0/112\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_03 --add-source="1234:5678::2:2:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"1234:5678::0:0:0/80\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_05 --add-source="1234:5678::0:0:0/80"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"1234:5678::1:1:1\" "
at_fn_check_prepare_trace "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=foobar_00 --add-source="1234:5678::1:1:1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_trace "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld ipsetv4; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld ipsetv4; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv4 {
type ipv4_addr
flags interval
elements = { 192.0.2.12 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld ipsetv6; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld ipsetv6; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv6 {
type ipv6_addr
flags interval
elements = { ::2 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_trace "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_trace "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-source=\"1234:5678::10:10:10\" "
at_fn_check_prepare_trace "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-source="1234:5678::10:10:10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=public --add-source=\"1234:5678::20:20:20\" "
at_fn_check_prepare_trace "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=public --add-source="1234:5678::20:20:20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6 "
at_fn_check_prepare_trace "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_trace "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013 firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip saddr 10.1.1.1 goto filter_IN_foobar_00
ip6 saddr 1234:5678::1:1:1 goto filter_IN_foobar_00
ip saddr 10.1.1.0/24 goto filter_IN_foobar_01
ip6 saddr 1234:5678::1:1:0/112 goto filter_IN_foobar_01
ip saddr 10.10.10.10 goto filter_IN_foobar_010
ip6 saddr 1234:5678::10:10:10 goto filter_IN_foobar_010
ip saddr @ipsetv4 goto filter_IN_foobar_011
ip6 saddr @ipsetv6 goto filter_IN_foobar_012
ip saddr 10.1.0.0/16 goto filter_IN_foobar_02
ip6 saddr 1234:5678::1:0:0/96 goto filter_IN_foobar_02
ip saddr 10.2.2.0/24 goto filter_IN_foobar_03
ip6 saddr 1234:5678::2:2:0/112 goto filter_IN_foobar_03
ip saddr 10.2.0.0/16 goto filter_IN_foobar_04
ip6 saddr 1234:5678::2:0:0/96 goto filter_IN_foobar_04
ip saddr 10.0.0.0/8 goto filter_IN_foobar_05
ip6 saddr 1234:5678::/80 goto filter_IN_foobar_05
ip saddr 20.20.20.20 goto filter_IN_public
ip6 saddr 1234:5678::20:20:20 goto filter_IN_public
iifname \"foobar2\" goto filter_IN_foobar_010
iifname \"foobar1\" goto filter_IN_trusted
iifname \"foobar0\" goto filter_IN_internal
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING_ZONES {
ip daddr 10.1.1.1 goto nat_POST_foobar_00
ip daddr 10.1.1.0/24 goto nat_POST_foobar_01
ip daddr 10.10.10.10 goto nat_POST_foobar_010
ip daddr @ipsetv4 goto nat_POST_foobar_011
ip daddr 10.1.0.0/16 goto nat_POST_foobar_02
ip daddr 10.2.2.0/24 goto nat_POST_foobar_03
ip daddr 10.2.0.0/16 goto nat_POST_foobar_04
ip daddr 10.0.0.0/8 goto nat_POST_foobar_05
ip daddr 20.20.20.20 goto nat_POST_public
oifname \"foobar2\" goto nat_POST_foobar_010
oifname \"foobar1\" goto nat_POST_trusted
oifname \"foobar0\" goto nat_POST_internal
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26978\" ip netns exec fwd-test-12013     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26978" ip netns exec fwd-test-12013     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POSTROUTING_ZONES {
ip6 daddr 1234:5678::1:1:1 goto nat_POST_foobar_00
ip6 daddr 1234:5678::1:1:0/112 goto nat_POST_foobar_01
ip6 daddr 1234:5678::10:10:10 goto nat_POST_foobar_010
ip6 daddr @ipsetv6 goto nat_POST_foobar_012
ip6 daddr 1234:5678::1:0:0/96 goto nat_POST_foobar_02
ip6 daddr 1234:5678::2:2:0/112 goto nat_POST_foobar_03
ip6 daddr 1234:5678::2:0:0/96 goto nat_POST_foobar_04
ip6 daddr 1234:5678::/80 goto nat_POST_foobar_05
ip6 daddr 1234:5678::20:20:20 goto nat_POST_public
oifname \"foobar2\" goto nat_POST_foobar_010
oifname \"foobar1\" goto nat_POST_trusted
oifname \"foobar0\" goto nat_POST_internal
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }


























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1734765.at:199" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:199"
            $as_echo "rhbz1734765.at:199" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:199"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_81
#AT_START_82
at_fn_group_banner 82 'gh509.at:1' \
  "missing firewalld.conf file" "                    " 4
at_xfail=no
(
  $as_echo "82. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5784" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh509.at:1: ip netns add fwd-test-5784"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; ip netns add fwd-test-5784
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" ip netns exec fwd-test-5784 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" ip netns exec fwd-test-5784 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" ip netns exec fwd-test-5784 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"





$as_echo "gh509.at:7" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/gh509.at:7"

{ set +x
$as_echo "$at_srcdir/gh509.at:9: if ! rm ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:9"
( $at_check_trace; if ! rm ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" ip netns exec fwd-test-5784 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:10" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:10"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15417" ip netns exec fwd-test-5784 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:10" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:10"









        if test x"-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'"; then
                sed -i -e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d' ./firewalld.log
            fi
            $as_echo "gh509.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:12"
            $as_echo "gh509.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_82
#AT_START_83
at_fn_group_banner 83 'python.at:3' \
  "firewalld_test.py" "                              " 5
at_xfail=no
(
  $as_echo "83. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27842" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-27842"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; ip netns add fwd-test-27842
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29551" ip netns exec fwd-test-27842 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29551" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29551" ip netns exec fwd-test-27842 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29551" ip netns exec fwd-test-27842 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29551\" ip netns exec fwd-test-27842 \$PYTHON \${srcdir}/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29551" ip netns exec fwd-test-27842 $PYTHON ${srcdir}/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:6" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
            $as_echo "python.at:6" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_83
#AT_START_84
at_fn_group_banner 84 'python.at:8' \
  "firewalld_config.py" "                            " 5
at_xfail=no
(
  $as_echo "84. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28776" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-28776"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; ip netns add fwd-test-28776
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21208" ip netns exec fwd-test-28776 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21208" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21208" ip netns exec fwd-test-28776 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21208" ip netns exec fwd-test-28776 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21208\" ip netns exec fwd-test-28776 \$PYTHON \${srcdir}/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21208" ip netns exec fwd-test-28776 $PYTHON ${srcdir}/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:11" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
            $as_echo "python.at:11" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_84
#AT_START_85
at_fn_group_banner 85 'python.at:13' \
  "firewalld_rich.py" "                              " 5
at_xfail=no
(
  $as_echo "85. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23704" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-23704"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; ip netns add fwd-test-23704
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17541" ip netns exec fwd-test-23704 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17541" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17541" ip netns exec fwd-test-23704 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17541" ip netns exec fwd-test-23704 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17541\" ip netns exec fwd-test-23704 \$PYTHON \${srcdir}/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17541" ip netns exec fwd-test-23704 $PYTHON ${srcdir}/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
            $as_echo "python.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_85
#AT_START_86
at_fn_group_banner 86 'python.at:18' \
  "firewalld_direct.py" "                            " 5
at_xfail=no
(
  $as_echo "86. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21845" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-21845"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; ip netns add fwd-test-21845
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7167" ip netns exec fwd-test-21845 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7167" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7167" ip netns exec fwd-test-21845 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7167" ip netns exec fwd-test-21845 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"





    { set +x
$as_echo "$at_srcdir/python.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7167\" ip netns exec fwd-test-21845 \$PYTHON \${srcdir}/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7167" ip netns exec fwd-test-21845 $PYTHON ${srcdir}/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
            $as_echo "python.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_86
#AT_START_87
at_fn_group_banner 87 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 6
at_xfail=no
(
  $as_echo "87. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-8368" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-8368"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-8368
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
oifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }
















{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:70: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:70"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16790\" ip netns exec fwd-test-8368     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16790" ip netns exec fwd-test-8368     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
oifname \"lo\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_87
#AT_START_88
at_fn_group_banner 88 'service_include.at:1' \
  "service include" "                                " 6
at_xfail=no
(
  $as_echo "88. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18768" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-18768"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-18768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/service_include.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_drop_allow {
ip daddr 239.255.255.250 udp dport 1900 ct state new,untracked accept
ip6 daddr ff02::c udp dport 1900 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
tcp dport 12345 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_trace "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_trace "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_trace "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_trace "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:94: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:94"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:97: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:97"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd --zone=public --list-services "
at_fn_check_prepare_trace "service_include.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9282\" ip netns exec fwd-test-18768 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9282" ip netns exec fwd-test-18768 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE: does-not-exist/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE: does-not-exist/d' ./firewalld.log
            fi
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_88
#AT_START_89
at_fn_group_banner 89 'helpers_custom.at:1' \
  "customer helpers" "                               " 6
at_xfail=no
(
  $as_echo "89. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9372" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-9372"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-9372
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_trace "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_trace "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_trace "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --service=ftptest --add-module=\"nf_conntrack_ftptest\" "
at_fn_check_prepare_trace "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --service=ftptest --add-module="nf_conntrack_ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_trace "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --reload "
at_fn_check_prepare_trace "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --state "
at_fn_check_prepare_trace "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372 firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_trace "helpers_custom.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





$as_echo "helpers_custom.at:20" >"$at_check_line_file"
(    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372 sh -c 'test "$(sysctl -n net.netfilter.nf_conntrack_helper)" -eq "1"' ) \
  && at_fn_check_skip 77 "$at_srcdir/helpers_custom.at:20"






    { set +x
$as_echo "$at_srcdir/helpers_custom.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30539\" ip netns exec fwd-test-9372     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30539" ip netns exec fwd-test-9372     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }

























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "helpers_custom.at:48" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:48"
            $as_echo "helpers_custom.at:48" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_89
#AT_START_90
at_fn_group_banner 90 'firewall-cmd.at:5' \
  "basic options" "                                  " 7
at_xfail=no
(
  $as_echo "90. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6065" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-6065"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-6065
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd -h "
at_fn_check_prepare_trace "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --help "
at_fn_check_prepare_trace "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd -V "
at_fn_check_prepare_trace "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_trace "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --panic-on "
at_fn_check_prepare_trace "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --panic-off "
at_fn_check_prepare_trace "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7409\" ip netns exec fwd-test-6065 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7409" ip netns exec fwd-test-6065 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_90
#AT_START_91
at_fn_group_banner 91 'firewall-cmd.at:28' \
  "get/list options" "                               " 7
at_xfail=no
(
  $as_echo "91. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28755" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-28755"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-28755
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23612\" ip netns exec fwd-test-28755 firewall-cmd --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23612" ip netns exec fwd-test-28755 firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_91
#AT_START_92
at_fn_group_banner 92 'firewall-cmd.at:44' \
  "default zone" "                                   " 7
at_xfail=no
(
  $as_echo "92. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16191" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-16191"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-16191
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3547\" ip netns exec fwd-test-16191 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3547\" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_trace "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3547\" ip netns exec fwd-test-16191 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3547\" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_trace "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3547\" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3547" ip netns exec fwd-test-16191 firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_92
#AT_START_93
at_fn_group_banner 93 'firewall-cmd.at:56' \
  "user zone" "                                      " 7
at_xfail=no
(
  $as_echo "93. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30871" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-30871"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-30871
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_trace "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_trace "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_trace "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28605\" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28605" ip netns exec fwd-test-30871 firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TARGET: BAD/d'"; then
                sed -i -e '/ERROR: INVALID_TARGET: BAD/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_93
#AT_START_94
at_fn_group_banner 94 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 7
at_xfail=no
(
  $as_echo "94. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-486" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: ip netns add fwd-test-486"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; ip netns add fwd-test-486
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-active-zones "
at_fn_check_prepare_trace "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --add-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --set-default-zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --remove-interface=bar "
at_fn_check_prepare_trace "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31721\" ip netns exec fwd-test-486 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31721" ip netns exec fwd-test-486 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'"; then
                sed -i -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_94
#AT_START_95
at_fn_group_banner 95 'firewall-cmd.at:169' \
  "zone sources" "                                   " 7
at_xfail=no
(
  $as_echo "95. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4812" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: ip netns add fwd-test-4812"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; ip netns add fwd-test-4812
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16702\" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16702" ip netns exec fwd-test-4812 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            if test -n " -e '/ERROR: ZONE_CONFLICT/d'"; then
                sed -i  -e '/ERROR: ZONE_CONFLICT/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_95
#AT_START_96
at_fn_group_banner 96 'firewall-cmd.at:221' \
  "services" "                                       " 7
at_xfail=no
(
  $as_echo "96. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18037" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: ip netns add fwd-test-18037"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; ip netns add fwd-test-18037
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_trace "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_trace "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_trace "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_trace "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4886\" ip netns exec fwd-test-18037 firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4886" ip netns exec fwd-test-18037 firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE:/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_96
#AT_START_97
at_fn_group_banner 97 'firewall-cmd.at:265' \
  "user services" "                                  " 7
at_xfail=no
(
  $as_echo "97. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7160" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: ip netns add fwd-test-7160"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; ip netns add fwd-test-7160
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_trace "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_trace "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_trace "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25056\" ip netns exec fwd-test-7160 firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25056" ip netns exec fwd-test-7160 firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'"; then
                sed -i -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_97
#AT_START_98
at_fn_group_banner 98 'firewall-cmd.at:337' \
  "ports" "                                          " 7
at_xfail=no
(
  $as_echo "98. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-13285" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: ip netns add fwd-test-13285"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; ip netns add fwd-test-13285
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --zone home --list-ports "
at_fn_check_prepare_trace "firewall-cmd.at:340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_trace "firewall-cmd.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_trace "firewall-cmd.at:344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2188\" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2188" ip netns exec fwd-test-13285 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_98
#AT_START_99
at_fn_group_banner 99 'firewall-cmd.at:394' \
  "source ports" "                                   " 7
at_xfail=no
(
  $as_echo "99. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-8910" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: ip netns add fwd-test-8910"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; ip netns add fwd-test-8910
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_trace "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28724\" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28724" ip netns exec fwd-test-8910 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_99
#AT_START_100
at_fn_group_banner 100 'firewall-cmd.at:431' \
  "protocols" "                                      " 7
at_xfail=no
(
  $as_echo "100. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-29425" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: ip netns add fwd-test-29425"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; ip netns add fwd-test-29425
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8825\" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8825" ip netns exec fwd-test-29425 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_PROTOCOL: dummy/d'"; then
                sed -i -e '/ERROR: INVALID_PROTOCOL: dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_100
#AT_START_101
at_fn_group_banner 101 'firewall-cmd.at:459' \
  "masquerade" "                                     " 7
at_xfail=no
(
  $as_echo "101. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26321" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: ip netns add fwd-test-26321"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; ip netns add fwd-test-26321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1410\" ip netns exec fwd-test-26321 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1410" ip netns exec fwd-test-26321 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:490" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:490"
            $as_echo "firewall-cmd.at:490" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:490"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_101
#AT_START_102
at_fn_group_banner 102 'firewall-cmd.at:492' \
  "forward ports" "                                  " 7
at_xfail=no
(
  $as_echo "102. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22556" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: ip netns add fwd-test-22556"
at_fn_check_prepare_trace "firewall-cmd.at:492"
( $at_check_trace; ip netns add fwd-test-22556
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:492" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:492"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:11 to::22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:4.4.4.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:580:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:580"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:580"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:586:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:586"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:586"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21559\" ip netns exec fwd-test-22556 firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21559" ip netns exec fwd-test-22556 firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:607" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:607"
            $as_echo "firewall-cmd.at:607" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:607"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_102
#AT_START_103
at_fn_group_banner 103 'firewall-cmd.at:609' \
  "ICMP block" "                                     " 7
at_xfail=no
(
  $as_echo "103. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:609"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-29014" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609: ip netns add fwd-test-29014"
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace; ip netns add fwd-test-29014
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:609" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:609"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_trace "firewall-cmd.at:612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:612"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:615:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:615"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:615"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:616:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:616"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:616"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:617:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:617"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:617"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:618:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:618"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:618"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:625:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:625"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:625"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:627:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:627"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:627"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:628:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:628"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:628"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:629:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:629"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:629"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:630"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:631"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:634"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:636:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:636"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:636"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:637:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:637"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:637"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:639:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:639"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:639"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:644:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:644"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:644"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:646:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:646"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:646"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:647:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:647"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:647"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:648:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:648"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:648"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:649:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:649"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:649"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:650:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:650"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:650"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:651"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:652:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12337\" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:652"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12337" ip netns exec fwd-test-29014 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:652"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ICMPTYPE:/d'"; then
                sed -i -e '/ERROR: INVALID_ICMPTYPE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_103
#AT_START_104
at_fn_group_banner 104 'firewall-cmd.at:655' \
  "user ICMP types" "                                " 7
at_xfail=no
(
  $as_echo "104. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3063" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: ip netns add fwd-test-3063"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; ip netns add fwd-test-3063
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:658"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:663"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:665"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:666"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:671"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16871\" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16871" ip netns exec fwd-test-3063 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            if test -n "-e '/NAME_CONFLICT: new_icmptype():/d'"; then
                sed -i -e '/NAME_CONFLICT: new_icmptype():/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:676" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:676"
            $as_echo "firewall-cmd.at:676" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:676"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_104
#AT_START_105
at_fn_group_banner 105 'firewall-cmd.at:678' \
  "ipset" "                                          " 7
at_xfail=no
(
  $as_echo "105. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:678"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-65" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:678: ip netns add fwd-test-65"
at_fn_check_prepare_trace "firewall-cmd.at:678"
( $at_check_trace; ip netns add fwd-test-65
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:678" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:678"










        $as_echo "firewall-cmd.at:682" >"$at_check_line_file"
(! ipset --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:682"
        $as_echo "firewall-cmd.at:682" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 ipset create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:682"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 ipset destroy foobar "
at_fn_check_prepare_trace "firewall-cmd.at:682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 ipset destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:682"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:684:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_trace "firewall-cmd.at:684"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:684"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_trace "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:700"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:703"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_trace "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_trace "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:710"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:715:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_trace "firewall-cmd.at:715"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:715"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_trace "firewall-cmd.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17171\" ip netns exec fwd-test-65 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17171" ip netns exec fwd-test-65 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }


















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ENTRY: invalid address/d'"; then
                sed -i -e '/ERROR: INVALID_ENTRY: invalid address/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:729" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:729"
            $as_echo "firewall-cmd.at:729" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:729"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_105
#AT_START_106
at_fn_group_banner 106 'firewall-cmd.at:731' \
  "user helpers" "                                   " 7
at_xfail=no
(
  $as_echo "106. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:731"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5969" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: ip netns add fwd-test-5969"
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace; ip netns add fwd-test-5969
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:731" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:731"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_trace "firewall-cmd.at:734"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_trace "firewall-cmd.at:735"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:739"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_trace "firewall-cmd.at:741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:743:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_trace "firewall-cmd.at:743"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:743"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:745"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:755:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:755"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17633\" ip netns exec fwd-test-5969 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17633" ip netns exec fwd-test-5969 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_MODULE:/d'"; then
                sed -i -e '/ERROR: INVALID_MODULE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:757" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:757"
            $as_echo "firewall-cmd.at:757" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:757"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_106
#AT_START_107
at_fn_group_banner 107 'firewall-cmd.at:759' \
  "direct" "                                         " 7
at_xfail=no
(
  $as_echo "107. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-19136" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: ip netns add fwd-test-19136"
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace; ip netns add fwd-test-19136
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:759"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:774"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:775"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:776:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:776"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:776"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:778:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:778"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:778"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:783"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:786"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:787:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:787"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:787"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_trace "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --reload "
at_fn_check_prepare_trace "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8691\" ip netns exec fwd-test-19136 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8691" ip netns exec fwd-test-19136 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'"; then
                sed -i -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_107
#AT_START_108
at_fn_group_banner 108 'firewall-cmd.at:832' \
  "direct nat" "                                     " 7
at_xfail=no
(
  $as_echo "108. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:832"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16613" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832: ip netns add fwd-test-16613"
at_fn_check_prepare_trace "firewall-cmd.at:832"
( $at_check_trace; ip netns add fwd-test-16613
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:841"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:849:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:849"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:849"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26417\" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26417" ip netns exec fwd-test-16613 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
            $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_108
#AT_START_109
at_fn_group_banner 109 'firewall-cmd.at:856' \
  "direct passthrough" "                             " 7
at_xfail=no
(
  $as_echo "109. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:856"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16009" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: ip netns add fwd-test-16009"
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace; ip netns add fwd-test-16009
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:856" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:856"





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:859: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:859"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:859"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:861"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:862:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:862"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:862"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:866:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:866"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:866"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:880:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:880"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:880"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_trace "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:890"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:892:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6810\" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:892"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6810" ip netns exec fwd-test-16009 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:892"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            if test -n "-e '/WARNING: NOT_ENABLED: passthrough/d'"; then
                sed -i -e '/WARNING: NOT_ENABLED: passthrough/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:893" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:893"
            $as_echo "firewall-cmd.at:893" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:893"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_109
#AT_START_110
at_fn_group_banner 110 'firewall-cmd.at:895' \
  "direct ebtables" "                                " 7
at_xfail=no
(
  $as_echo "110. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:895"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1702" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: ip netns add fwd-test-1702"
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace; ip netns add fwd-test-1702
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:895" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:895"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:913"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:915"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:927:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_trace "firewall-cmd.at:927"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:927"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:928:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:928"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:928"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:930"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:931"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:932:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:932"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:932"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:933"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:933"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13896\" ip netns exec fwd-test-1702     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13896" ip netns exec fwd-test-1702     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:938" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:938"
            $as_echo "firewall-cmd.at:938" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:938"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_110
#AT_START_111
at_fn_group_banner 111 'firewall-cmd.at:940' \
  "lockdown" "                                       " 7
at_xfail=no
(
  $as_echo "111. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14084" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: ip netns add fwd-test-14084"
at_fn_check_prepare_trace "firewall-cmd.at:940"
( $at_check_trace; ip netns add fwd-test-14084
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:940" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:940"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:943:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:943"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:943"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:944:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:944"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:962:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:962"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:962"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:965"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:970"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:972"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:973:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:973"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:973"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:976"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:978"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:981"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:982:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:982"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:982"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:984"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:989" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:989"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_trace "firewall-cmd.at:990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:990"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --lockdown-on "
at_fn_check_prepare_trace "firewall-cmd.at:991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:992:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:992"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:992"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --lockdown-off "
at_fn_check_prepare_trace "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13904\" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13904" ip netns exec fwd-test-14084 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:994"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:995" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:995"
            $as_echo "firewall-cmd.at:995" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:995"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_111
#AT_START_112
at_fn_group_banner 112 'firewall-cmd.at:1007' \
  "rich rules good" "                                " 7
at_xfail=no
(
  $as_echo "112. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1007"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26244" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: ip netns add fwd-test-26244"
at_fn_check_prepare_trace "firewall-cmd.at:1007"
( $at_check_trace; ip netns add fwd-test-26244
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1007" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1007"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1010:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1010"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1010"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1023"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1024"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1025"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1027"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1029"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17998\" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17998" ip netns exec fwd-test-26244 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1035" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1035"
            $as_echo "firewall-cmd.at:1035" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1035"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_112
#AT_START_113
at_fn_group_banner 113 'firewall-cmd.at:1036' \
  "rich rules audit" "                               " 7
at_xfail=no
(
  $as_echo "113. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1036"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-29336" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036: ip netns add fwd-test-29336"
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace; ip netns add fwd-test-29336
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1036" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1036"












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24981\" ip netns exec fwd-test-29336 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24981" ip netns exec fwd-test-29336 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1041" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1041"
            $as_echo "firewall-cmd.at:1041" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1041"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_113
#AT_START_114
at_fn_group_banner 114 'firewall-cmd.at:1044' \
  "rich rules priority" "                            " 7
at_xfail=no
(
  $as_echo "114. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27541" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: ip netns add fwd-test-27541"
at_fn_check_prepare_trace "firewall-cmd.at:1044"
( $at_check_trace; ip netns add fwd-test-27541
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1044" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1044"




















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_public_log all -- 0.0.0.0/0 0.0.0.0/0
IN_public_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_public_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_public_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDI_public_pre all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_log all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_deny all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_allow all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
AUDIT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1143"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3333 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }





































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1182"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1197"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1206"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1217"
$at_failed && at_fn_log_failure
$at_traceon; }


































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 10.1.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.1.1.0/24 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.0.0/16 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1358"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8888 to::80
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 to:10.1.1.1:80
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:222 to::22
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 to:10.1.1.1:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.1.1.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.10.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1372"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1377"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1400"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1406"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1407"
$at_failed && at_fn_log_failure
$at_traceon; }



























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1462"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1466"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1469"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1473:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1473"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1473"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1477"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1480"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1520"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1522"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1523"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1530"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1531:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1531"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1531"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED
ACCEPT all -- 10.10.10.0/24 0.0.0.0/0
LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
DROP all -- 10.0.0.0/8 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1576"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1584"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1587"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 ctstate NEW,UNTRACKED
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"'DROPPED: '\"
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }






















































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "firewall-cmd.at:1619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1619"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1620"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1624"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1625:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4887\" ip netns exec fwd-test-27541 firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1625"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4887" ip netns exec fwd-test-27541 firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1625"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1654" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1654"
            $as_echo "firewall-cmd.at:1654" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1654"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_114
#AT_START_115
at_fn_group_banner 115 'firewall-cmd.at:1659' \
  "rich rules bad" "                                 " 7
at_xfail=no
(
  $as_echo "115. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1659"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11270" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1659: ip netns add fwd-test-11270"
at_fn_check_prepare_trace "firewall-cmd.at:1659"
( $at_check_trace; ip netns add fwd-test-11270
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1659"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1659" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1659"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1666"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1666"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1686"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1687"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1687"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14248\" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14248" ip netns exec fwd-test-11270 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'"; then
                sed -i -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1690" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1690"
            $as_echo "firewall-cmd.at:1690" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1690"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_115
#AT_START_116
at_fn_group_banner 116 'firewall-cmd.at:1695' \
  "config validation" "                              " 7
at_xfail=no
(
  $as_echo "116. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1695"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9095" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695: ip netns add fwd-test-9095"
at_fn_check_prepare_trace "firewall-cmd.at:1695"
( $at_check_trace; ip netns add fwd-test-9095
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-681" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1695" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1695"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1704: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1704"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1705: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1705"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1705"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1706"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1720"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1728"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1729: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1729"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1729"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1746:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1746"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1746"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1755: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1755"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1755"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1758: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1758"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1758"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1765"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1777:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1777"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1777"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1784"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1785"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1788"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1812: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1812"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1815: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1815"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1815"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1830"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1831: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1831"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1831"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1834: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1834"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1834"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1841"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1849:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1849"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1849"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1857"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1865"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1873"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1881"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1890"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1898"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1899: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1899"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1902: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1902"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1902"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1906"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1922:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1922"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1922"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1930"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1962:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1962"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1962"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1978"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1994"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2022:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2022"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2022"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2037:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2037"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2037"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2052:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-681\" ip netns exec fwd-test-9095 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:2052"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-681" ip netns exec fwd-test-9095 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2052"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2070"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            if test -n "-e '/ERROR:/d'              -e '/WARNING:/d'"; then
                sed -i -e '/ERROR:/d'              -e '/WARNING:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:2072" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2072"
            $as_echo "firewall-cmd.at:2072" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2072"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_116
#AT_START_117
at_fn_group_banner 117 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 8
at_xfail=no
(
  $as_echo "117. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26844" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-26844"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-26844
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844 firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_trace "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32638\" ip netns exec fwd-test-26844     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32638" ip netns exec fwd-test-26844     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_117
#AT_START_118
at_fn_group_banner 118 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 8
at_xfail=no
(
  $as_echo "118. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12478" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-12478"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-12478
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:5: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:5"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:17: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:17"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd --state "
at_fn_check_prepare_trace "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24368\" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24368" ip netns exec fwd-test-12478 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            if test -n "-e '/.*a-bogus-flag.*/d'"; then
                sed -i -e '/.*a-bogus-flag.*/d' ./firewalld.log
            fi
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_118
#AT_START_119
at_fn_group_banner 119 'pr181.at:1' \
  "combined zones name length check" "               " 8
at_xfail=no
(
  $as_echo "119. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10794" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-10794"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-10794
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31790\" ip netns exec fwd-test-10794 firewall-cmd -q --reload "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31790\" ip netns exec fwd-test-10794 firewall-cmd -q --state "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31790\" ip netns exec fwd-test-10794 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31790" ip netns exec fwd-test-10794 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_119
#AT_START_120
at_fn_group_banner 120 'gh287.at:1' \
  "ICMP block inversion" "                           " 8
at_xfail=no
(
  $as_echo "120. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-18879" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-18879"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-18879
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" ip netns exec fwd-test-18879 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" ip netns exec fwd-test-18879 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" ip netns exec fwd-test-18879 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32174\" ip netns exec fwd-test-18879 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" ip netns exec fwd-test-18879 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32174\" ip netns exec fwd-test-18879 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32174" ip netns exec fwd-test-18879 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_120
#AT_START_121
at_fn_group_banner 121 'individual_calls.at:1' \
  "individual calls" "                               " 8
at_xfail=no
(
  $as_echo "121. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16806" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-16806"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-16806
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" ip netns exec fwd-test-16806 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" ip netns exec fwd-test-16806 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" ip netns exec fwd-test-16806 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21702\" ip netns exec fwd-test-16806 firewall-cmd -q --reload "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" ip netns exec fwd-test-16806 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21702\" ip netns exec fwd-test-16806 firewall-cmd -q --state "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21702" ip netns exec fwd-test-16806 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_121
#AT_START_122
at_fn_group_banner 122 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 8
at_xfail=no
(
  $as_echo "122. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-19012" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-19012"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-19012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30192\" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30192" ip netns exec fwd-test-19012 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_122
#AT_START_123
at_fn_group_banner 123 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 8
at_xfail=no
(
  $as_echo "123. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-19587" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-19587"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-19587
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" ip netns exec fwd-test-19587 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" ip netns exec fwd-test-19587 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" ip netns exec fwd-test-19587 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"





{ set +x
$as_echo "$at_srcdir/gh290.at:5: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:5"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:11: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:11"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/gh290.at:14: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:14"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:15: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:16: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:16"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:17: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:17"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:19: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:20: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:20"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:21: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:21"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" ip netns exec fwd-test-19587 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:23" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:23"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31054" ip netns exec fwd-test-19587 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:23" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:23"



    { set +x
$as_echo "$at_srcdir/gh290.at:24: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:25: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'"; then
                sed -i -e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d' ./firewalld.log
            fi
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_123
#AT_START_124
at_fn_group_banner 124 'icmp_block_in_forward_chain.at:1' \
  "ICMP block present FORWARD chain" "               " 8
at_xfail=no
(
  $as_echo "124. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27387" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-27387"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-27387
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21004\" ip netns exec fwd-test-27387 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21004\" ip netns exec fwd-test-27387     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21004\" ip netns exec fwd-test-27387     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21004" ip netns exec fwd-test-27387     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }













            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_124
#AT_START_125
at_fn_group_banner 125 'pr323.at:1' \
  "GRE proto helper" "                               " 8
at_xfail=no
(
  $as_echo "125. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30051" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-30051"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-30051
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19523\" ip netns exec fwd-test-30051 firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_trace "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19523\" ip netns exec fwd-test-30051 firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_trace "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19523\" ip netns exec fwd-test-30051 firewall-cmd -q --add-service=gre "
at_fn_check_prepare_trace "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19523" ip netns exec fwd-test-30051 firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_125
#AT_START_126
at_fn_group_banner 126 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 8
at_xfail=no
(
  $as_echo "126. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23400" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-23400"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-23400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"












    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_trace "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25335\" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25335" ip netns exec fwd-test-23400 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            if test -n "-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'"; then
                sed -i -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d' ./firewalld.log
            fi
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_126
#AT_START_127
at_fn_group_banner 127 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 8
at_xfail=no
(
  $as_echo "127. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11746" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-11746"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-11746
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24337\" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24337\" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24337\" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_trace "rhbz1594657.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24337\" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24337\" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24337" ip netns exec fwd-test-11746 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_127
#AT_START_128
at_fn_group_banner 128 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 8
at_xfail=no
(
  $as_echo "128. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20781" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-20781"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-20781
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_trace "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_trace "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30330\" ip netns exec fwd-test-20781 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30330" ip netns exec fwd-test-20781 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_128
#AT_START_129
at_fn_group_banner 129 'rhbz1404076.at:1' \
  "query single port added with range" "             " 8
at_xfail=no
(
  $as_echo "129. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7658" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-7658"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-7658
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27808\" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27808" ip netns exec fwd-test-7658 firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_129
#AT_START_130
at_fn_group_banner 130 'gh366.at:1' \
  "service destination multiple IP versions" "       " 8
at_xfail=no
(
  $as_echo "130. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32089" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-32089"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-32089
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_trace "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_trace "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_trace "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26752\" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26752" ip netns exec fwd-test-32089 firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_130
#AT_START_131
at_fn_group_banner 131 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 8
at_xfail=no
(
  $as_echo "131. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23755" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-23755"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-23755
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"












    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_trace "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:83: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:83"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20446\" ip netns exec fwd-test-23755     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20446" ip netns exec fwd-test-23755     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'" != x"ignore"; then
            if test -n "-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'"; then
                sed -i -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d' ./firewalld.log
            fi
            $as_echo "rhbz1601610.at:102" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:102"
            $as_echo "rhbz1601610.at:102" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_131
#AT_START_132
at_fn_group_banner 132 'gh303.at:1' \
  "unicode in XML" "                                 " 8
at_xfail=no
(
  $as_echo "132. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31522" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-31522"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-31522
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16960\" ip netns exec fwd-test-31522 firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_trace "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16960\" ip netns exec fwd-test-31522 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16960\" ip netns exec fwd-test-31522 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16960" ip netns exec fwd-test-31522 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_132
#AT_START_133
at_fn_group_banner 133 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 8
at_xfail=no
(
  $as_echo "133. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12917" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-12917"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-12917
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_trace "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_trace "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_trace "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16967\" ip netns exec fwd-test-12917 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16967" ip netns exec fwd-test-12917 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }
















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'"; then
                sed -i -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' ./firewalld.log
            fi
            $as_echo "gh335.at:68" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
            $as_echo "gh335.at:68" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_133
#AT_START_134
at_fn_group_banner 134 'gh482.at:1' \
  "remove forward-port after reload" "               " 8
at_xfail=no
(
  $as_echo "134. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4766" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-4766"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-4766
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20492\" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20492" ip netns exec fwd-test-4766 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_134
#AT_START_135
at_fn_group_banner 135 'gh478.at:1' \
  "rich rule marks every packet" "                   " 8
at_xfail=no
(
  $as_echo "135. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12177" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-12177"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-12177
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30551\" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_trace "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30551\" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_trace "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30551\" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_trace "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh478.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30551\" ip netns exec fwd-test-12177     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30551" ip netns exec fwd-test-12177     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234 MARK set 0xa
MARK icmp -- 0.0.0.0/0 0.0.0.0/0 MARK set 0xb
MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }






















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_135
#AT_START_136
at_fn_group_banner 136 'gh258.at:1' \
  "zone dispatch layout" "                           " 8
at_xfail=no
(
  $as_echo "136. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31645" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-31645"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-31645
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645 firewall-cmd --zone=work --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_trace "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 firewall-cmd --zone=work --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645 firewall-cmd --zone=work --add-interface=dummy0 "
at_fn_check_prepare_trace "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 firewall-cmd --zone=work --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645 firewall-cmd --zone=public --add-interface=dummy1 "
at_fn_check_prepare_trace "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645 firewall-cmd --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }






























































    { set +x
$as_echo "$at_srcdir/gh258.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:188:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:188"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:188"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:194"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDI_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDO_work all -- 0.0.0.0/0 1.2.3.0/24 [goto]
FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:219"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
POSTROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25149\" ip netns exec fwd-test-31645     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25149" ip netns exec fwd-test-31645     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_work all -- 0.0.0.0/0 1.2.3.0/24 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh258.at:336" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:336"
            $as_echo "gh258.at:336" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:336"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_136
#AT_START_137
at_fn_group_banner 137 'rhbz1715977.at:1' \
  "rich rule destination with service destination" " " 8
at_xfail=no
(
  $as_echo "137. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30135" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-30135"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-30135
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1982\" ip netns exec fwd-test-30135 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1982" ip netns exec fwd-test-30135 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_137
#AT_START_138
at_fn_group_banner 138 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 8
at_xfail=no
(
  $as_echo "138. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26593" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-26593"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-26593
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_trace "rhbz1723610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_trace "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_trace "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18066\" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18066" ip netns exec fwd-test-26593 firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1723610.at:31" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:31"
            $as_echo "rhbz1723610.at:31" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:31"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_138
#AT_START_139
at_fn_group_banner 139 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 8
at_xfail=no
(
  $as_echo "139. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3562" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-3562"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-3562
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_trace "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_trace "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_trace "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_trace "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_trace "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_trace "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_trace "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_trace "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_trace "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_trace "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_trace "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_trace "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_trace "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_trace "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_trace "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_trace "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_trace "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_trace "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_trace "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_trace "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_trace "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_trace "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_trace "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562 firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_trace "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562 firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }




















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_00 all -- 10.1.1.1 0.0.0.0/0 [goto]
IN_foobar_01 all -- 10.1.1.0/24 0.0.0.0/0 [goto]
IN_foobar_010 all -- 10.10.10.10 0.0.0.0/0 [goto]
IN_foobar_011 all -- 0.0.0.0/0 0.0.0.0/0 [goto] match-set ipsetv4 src
IN_foobar_02 all -- 10.1.0.0/16 0.0.0.0/0 [goto]
IN_foobar_03 all -- 10.2.2.0/24 0.0.0.0/0 [goto]
IN_foobar_04 all -- 10.2.0.0/16 0.0.0.0/0 [goto]
IN_foobar_05 all -- 10.0.0.0/8 0.0.0.0/0 [goto]
IN_public all -- 20.20.20.20 0.0.0.0/0 [goto]
IN_foobar_010 all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_internal all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }




















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4567\" ip netns exec fwd-test-3562     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4567" ip netns exec fwd-test-3562     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar_00 all -- 0.0.0.0/0 10.1.1.1 [goto]
POST_foobar_01 all -- 0.0.0.0/0 10.1.1.0/24 [goto]
POST_foobar_010 all -- 0.0.0.0/0 10.10.10.10 [goto]
POST_foobar_011 all -- 0.0.0.0/0 0.0.0.0/0 [goto] match-set ipsetv4 dst
POST_foobar_02 all -- 0.0.0.0/0 10.1.0.0/16 [goto]
POST_foobar_03 all -- 0.0.0.0/0 10.2.2.0/24 [goto]
POST_foobar_04 all -- 0.0.0.0/0 10.2.0.0/16 [goto]
POST_foobar_05 all -- 0.0.0.0/0 10.0.0.0/8 [goto]
POST_public all -- 0.0.0.0/0 20.20.20.20 [goto]
POST_foobar_010 all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_internal all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }






















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1734765.at:199" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:199"
            $as_echo "rhbz1734765.at:199" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:199"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_139
#AT_START_140
at_fn_group_banner 140 'gh509.at:1' \
  "missing firewalld.conf file" "                    " 8
at_xfail=no
(
  $as_echo "140. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21173" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh509.at:1: ip netns add fwd-test-21173"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; ip netns add fwd-test-21173
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" ip netns exec fwd-test-21173 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" ip netns exec fwd-test-21173 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" ip netns exec fwd-test-21173 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"





$as_echo "gh509.at:7" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/gh509.at:7"

{ set +x
$as_echo "$at_srcdir/gh509.at:9: if ! rm ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:9"
( $at_check_trace; if ! rm ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" ip netns exec fwd-test-21173 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:10" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:10"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21500" ip netns exec fwd-test-21173 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:10" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:10"









            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'" != x"ignore"; then
            if test -n "-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'"; then
                sed -i -e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d' ./firewalld.log
            fi
            $as_echo "gh509.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:12"
            $as_echo "gh509.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_140
#AT_START_141
at_fn_group_banner 141 'python.at:3' \
  "firewalld_test.py" "                              " 9
at_xfail=no
(
  $as_echo "141. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6062" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-6062"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; ip netns add fwd-test-6062
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2724" ip netns exec fwd-test-6062 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2724" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2724" ip netns exec fwd-test-6062 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2724" ip netns exec fwd-test-6062 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2724\" ip netns exec fwd-test-6062 \$PYTHON \${srcdir}/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2724" ip netns exec fwd-test-6062 $PYTHON ${srcdir}/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:6" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
            $as_echo "python.at:6" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_141
#AT_START_142
at_fn_group_banner 142 'python.at:8' \
  "firewalld_config.py" "                            " 9
at_xfail=no
(
  $as_echo "142. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3024" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-3024"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; ip netns add fwd-test-3024
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25996" ip netns exec fwd-test-3024 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25996" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25996" ip netns exec fwd-test-3024 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25996" ip netns exec fwd-test-3024 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25996\" ip netns exec fwd-test-3024 \$PYTHON \${srcdir}/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25996" ip netns exec fwd-test-3024 $PYTHON ${srcdir}/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:11" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
            $as_echo "python.at:11" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_142
#AT_START_143
at_fn_group_banner 143 'python.at:13' \
  "firewalld_rich.py" "                              " 9
at_xfail=no
(
  $as_echo "143. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24262" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-24262"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; ip netns add fwd-test-24262
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6597" ip netns exec fwd-test-24262 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6597" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6597" ip netns exec fwd-test-24262 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6597" ip netns exec fwd-test-24262 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6597\" ip netns exec fwd-test-24262 \$PYTHON \${srcdir}/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6597" ip netns exec fwd-test-24262 $PYTHON ${srcdir}/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
            $as_echo "python.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_143
#AT_START_144
at_fn_group_banner 144 'python.at:18' \
  "firewalld_direct.py" "                            " 9
at_xfail=no
(
  $as_echo "144. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17495" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-17495"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; ip netns add fwd-test-17495
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21203" ip netns exec fwd-test-17495 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21203" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21203" ip netns exec fwd-test-17495 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21203" ip netns exec fwd-test-17495 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"





    { set +x
$as_echo "$at_srcdir/python.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21203\" ip netns exec fwd-test-17495 \$PYTHON \${srcdir}/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21203" ip netns exec fwd-test-17495 $PYTHON ${srcdir}/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
            $as_echo "python.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_144
#AT_START_145
at_fn_group_banner 145 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 10
at_xfail=no
(
  $as_echo "145. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25620" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-25620"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-25620
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19124\" ip netns exec fwd-test-25620 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19124\" ip netns exec fwd-test-25620 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








































{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:70: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:70"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19124\" ip netns exec fwd-test-25620 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19124\" ip netns exec fwd-test-25620 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19124" ip netns exec fwd-test-25620 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }















































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_145
#AT_START_146
at_fn_group_banner 146 'service_include.at:1' \
  "service include" "                                " 10
at_xfail=no
(
  $as_echo "146. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21965" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-21965"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-21965
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/service_include.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:12345 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_trace "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_trace "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_trace "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_trace "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:94: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:94"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:97: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:97"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd --zone=public --list-services "
at_fn_check_prepare_trace "service_include.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11010\" ip netns exec fwd-test-21965 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11010" ip netns exec fwd-test-21965 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE: does-not-exist/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE: does-not-exist/d' ./firewalld.log
            fi
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_146
#AT_START_147
at_fn_group_banner 147 'helpers_custom.at:1' \
  "customer helpers" "                               " 10
at_xfail=no
(
  $as_echo "147. $at_setup_line: testing $at_desc ..."
  $at_traceon


            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32030" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-32030"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-32030
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_trace "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_trace "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_trace "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --service=ftptest --add-module=\"nf_conntrack_ftptest\" "
at_fn_check_prepare_trace "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --service=ftptest --add-module="nf_conntrack_ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_trace "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --reload "
at_fn_check_prepare_trace "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --state "
at_fn_check_prepare_trace "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030 firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_trace "helpers_custom.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





$as_echo "helpers_custom.at:20" >"$at_check_line_file"
(    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030 sh -c 'test "$(sysctl -n net.netfilter.nf_conntrack_helper)" -eq "1"' ) \
  && at_fn_check_skip 77 "$at_srcdir/helpers_custom.at:20"









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2040\" ip netns exec fwd-test-32030     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2040" ip netns exec fwd-test-32030     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "helpers_custom.at:48" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:48"
            $as_echo "helpers_custom.at:48" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_147
